1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
3 years ago
12

which of the following can be represented by a sequence of bits. 1. An integer 2. An alphanumeric character 3. A machine languag

e instruction
Computers and Technology
1 answer:
goblinko [34]3 years ago
3 0

Answer:

all of them

Explanation:

In a computer program, this is how numbers, text and program instructions are stored.

You might be interested in
How to design remote access policy using the appropriate access controls for systems,applications, and data access
nata0808 [166]

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

4 0
3 years ago
Which is an advantage the electronic scheduling tools have over paper calenders?​
MA_775_DIABLO [31]

Answer:

The electronic scheduling tool can help you set an alarm as a reminder for different events, grouping them in other of dates, time, location and the concept of occasion if you need to pick anything along.

The paper calendar cannot do all this, just for you to check manually.

Explanation:

Electronic scheduling is fast, accurate and more organized, paper calendar is manual and less convenient to access.

8 0
3 years ago
Example of Not a computer characteristics example
Allushta [10]

Answer:

A book

A non electronic

Explanation:

5 0
3 years ago
In the year, , the American Department of Defense put a military research network, called ARPANET online.
mario62 [17]

Answer:

November 21st of 1969.

Explanation:

In the year, 1969, the American Department of Defense put a military research network, called ARPANET online.

3 0
2 years ago
18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *
Natali [406]

Explanation:

FORMAT

because it is used for the general appearance of the page

6 0
3 years ago
Other questions:
  • What is the final step used when designing an algorithm?
    14·1 answer
  • Karen has opened a new business and is using Google Display Ads to build awareness of her new products. How does Google Display
    6·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • Which of the following best describes the 7x7 PowerPoint rule
    8·1 answer
  • A defensive driver's priority is __<br> A. efficiency<br> B. speed<br> C. handling<br> D. safety
    9·2 answers
  • What are some benefits of 3-D printing?
    9·1 answer
  • Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
    8·1 answer
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!