1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
3 years ago
11

Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number

Computers and Technology
1 answer:
lord [1]3 years ago
8 0

Answer:

C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

You might be interested in
JOIN GO.OGLE CLASSROOM IF YOUR A FAN OF FRANK OCEAN
Mrrafil [7]
Yes i agree perfectly
3 0
3 years ago
Read 2 more answers
What will happen if you type pseudocode in another language's programming environment and try to run the
wariber [46]

Answer:

You will get compile error

Explanation:

7 0
3 years ago
Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
Andreas93 [3]

Answer:

- the Keyboard:

The keyboard is a handheld device used to input alphabet, numbers, symbols and characters to a monitor. It also houses the special manipulative and function keys.

- the Control Unit:

The control unit is a component of the CPU which directs the operation of the processor.

- the Printer:

The printer is an external hardware output device which takes electronic data stored on a device and creates a hard copy.

4 0
2 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
Next, Adnan decides to recreate the structure on the
Lena [83]

Answer:

a square and a rectangle

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • In poor weather , you should ___ your following distance.
    12·1 answer
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • It proceeds the statement causes execution of the current loop iteration to end and commence at the beginning of the next loop.
    10·1 answer
  • What error occurs when you perform an illegal math operation such as divide by zero
    13·1 answer
  • A company currently uses Microsoft Active Directory as its identity provider. The company recently purchased Oracle Cloud Infras
    13·1 answer
  • This has nothing to do with anything school related, but I'm new to car audio and I was wondering, what happens or what would ha
    13·1 answer
  • Before posting a picture online, make sure to
    7·1 answer
  • How many questions have you seen so far other than this one?
    10·2 answers
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!