1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
8

Explain the complement of a number along with the complements of the binary and decimal number systems.why is the complement met

hod important for a computer system?​
Computers and Technology
1 answer:
umka2103 [35]3 years ago
3 0

olha so olha la que bacana bonito

You might be interested in
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
4. When inserting clip art into a page of text, which of the following is true? (1 point)
ella [17]
I would vote for D since you can adjust picture positioning and wrapping. A is BS, B and C are not true.
8 0
3 years ago
Read 2 more answers
How do i win Mine Craft
Vlad [161]
Answer: defeat the dragon? I think
3 0
3 years ago
Read 2 more answers
What is self management.​
OLEGan [10]

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

8 0
3 years ago
Read 2 more answers
Can someone text me cuss I'm bored my number is (225) 975 7120
slavikrds [6]

Be careful sending numbers online, people could easily dox/track you down just for that. Also I won't text you but I wouldn't mind chatting on here

3 0
4 years ago
Other questions:
  • All of the following are methods of communication
    8·2 answers
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit and provide methodsto get the temperature in Fahrenheit, Ce
    14·1 answer
  • Explain the difference between social engineering and reverse social engineering.
    6·1 answer
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • Which of the following statements best compares and contrasts hot and cold type?
    12·1 answer
  • GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.
    9·2 answers
  • In a relational database, information is organized into tables in which each row represents a(n ) ________. Group of answer choi
    6·1 answer
  • Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!