1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
9

The binary number represented by the voltage graph below is

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
3 0

Answer:

the answer is the pattern is odd numbers like Odd numbers are whole numbers that cannot be divided exactly into pairs. Odd numbers, when divided by 2, leave a remainder of 1. 1, 3, 5, 7, 9, 11, 13, 15 are sequential odd numbers. Odd numbers have the digits 1, 3, 5, 7 or 9 in their ones place.

Explanation:

You might be interested in
In which utility is the file search option found in windows
OLEGan [10]

Press Windows logo key + X Key.

Click on Control Panel.

Double Click on Troubleshooting.

Click on View all option, on left hand side of the window.

Click on Search and indexing and follow the on screen instructions.

5 0
4 years ago
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
i emailed someone and im sure that they emailed back however it says nothing has arrived in my inbox what do I do
Lynna [10]

Answer:

report it or check ur spam mail or refresh the page

Explanation:

good luck figuring it out :)

8 0
3 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
Kyle owns a growing delivery business. He would like to buy two more vans but first he needs to figure out related costs and his
guajiro [1.7K]

He will use a spreadsheet. hope this helped


4 0
4 years ago
Read 2 more answers
Other questions:
  • Copying and pasting from the internet can be done without citing the internet page, because everything on the internet is common
    13·1 answer
  • A computer is a(n) ____ device, operating under the control of instructions stored in its own memory, that can accept data, proc
    9·1 answer
  • The registrar does all of the following except:
    12·2 answers
  • Advantages of heading attributes
    5·1 answer
  • is a shell program in Windows that holds individual utilities called snap-ins, designed for administration and troubleshooting.
    11·1 answer
  • To move to the beginning of the line with the keyboard, press the _______ key(s).
    6·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • What is a common use for spreadsheets? A.drawing B.writing C.budgeting D.video production
    8·1 answer
  • Name 6 examples of how telemedicine is used in healthcare
    7·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!