1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
2 years ago
15

How would you describe binary to someone ?? PLEASE ANSWER I WILL GIVE U BRAINLY!!

Computers and Technology
2 answers:
Artyom0805 [142]2 years ago
6 0

Answer:

The idea that there are only two genders is sometimes called a “gender binary,” because binary means “having two parts” (male and female). Therefore, “non-binary” is one term people use to describe genders that don't fall into one of these two categories, male or female.

Explanation:

brainz plz

nalin [4]2 years ago
5 0

Answer:

Binary is a set of compiled human readable instructions for the CPU to interpret.

You might be interested in
These icons cannot be removed from the Dock. Finder e-mail music player Trash
Tcecarenko [31]

Answer:

Trash and Finder

Explanation:

There are, however, a couple of items that cannot be removed from the Dock–the Finder and the Trash.

4 0
3 years ago
Describe how data center storage applications drive the development of SAN technology.
Ede4ka [16]

Answer:

 The storage area network basically apply in the networking model for storage various application in the data center. The storage area network (SAN) provide the common pathway between the server and the storage device.

The storage area network technology basically implemented in the fiber channel configuration over the ethernet. SAN provide access to the data that shared by the personal resources. It is basically simple and dedicated network which provide for the data storage.

 

5 0
3 years ago
Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
Anni [7]
Yes, windows 7 does support secure boot in UEFI. UEFI allows for backward compatibility. IT can boot a MBR hard drive and provides a BIOS boot through its Compatibility Support Module (CSM) feature.
4 0
3 years ago
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,
Irina-Kira [14]
The correct answer is usually referred to as '<span>confidentiality'.</span>
4 0
3 years ago
In the accompanying figure, the split double arrow mouse pointer____.
finlep [7]
Based on the attached figure to this question, it shows that the split double arrow mouse pointer shows the result of moving the pointer of the mouse to the boundary between the column heading A and column heading B. (This answer is based on the actual options attached to this question.)
5 0
3 years ago
Other questions:
  • The use of digital technology and the Internet to execute the major business processes in the enterprise is called
    11·1 answer
  • Henry Ford would have been most interested to bring which modern innovation to his automotive factories?
    5·2 answers
  • When pasting information copied from a Word document into an Excel spreadsheet, click in the cell that will be the _______ of th
    7·2 answers
  • A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
    7·1 answer
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Netwo
    7·1 answer
  •  Which device containing sensors send signals to the computer whenever light changes are detected? 
    11·1 answer
  • For each of the descriptions below, perform the following tasks:
    11·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!