1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
9

1 Which of the following could work as bits for a binary system?

Computers and Technology
1 answer:
patriot [66]3 years ago
8 0
It’s B you can count it on ur fingers
You might be interested in
Data that can be used to identity a single individual is known as
lys-0071 [83]

Answer:

Fingerprint Recognition

Explanation:

3 0
4 years ago
Give an efficient algorithm to find all keys in a min heap that are smaller than a provided valueX. The provided valuedoes notha
OlgaM077 [116]

Answer:

Starting from root, recursively traverse the min-heap. Once we find a key with value less than our X, we know that every key in subtree of that key will be also smaller than our X. Otherwise, we should keep traversing.

Explanation:

The complexity of this algorithm will be O(N) where N is the number of keys in our min-heap.

3 0
3 years ago
Which statement correctly compares Word Online and Word?
Morgarella [4.7K]
Both can be used for saving documents
6 0
4 years ago
Read 2 more answers
What's wrong with Brainly now? Now people think it's site for s.ex which it isn't. These weirdos need to go
Dmitry [639]

Answer:

Honestly it is disgusting.

6 0
3 years ago
Read 2 more answers
Hello people, I was wandering if I could get some people to complete this questionnaire for my business course. It would be very
madam [21]
What do I have to do
3 0
3 years ago
Other questions:
  • A table is a predesigned database that includes professionally designed database objects.
    12·1 answer
  • Keep the base of your _________ on the mouse pad or desk?
    12·2 answers
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
    6·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • 1. Tracy is studying to become an esthetician. Give three reasons why she needs to have a thorough
    11·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • When running the following code:
    10·1 answer
  • Who is known as Mecile Man of India?​
    7·2 answers
  • Which of the following could be part of an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!