1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
2 years ago
15

How would you describe binary to someone ?? PLEASE ANSWER I WILL GIVE U BRAINLY!!

Computers and Technology
2 answers:
Artyom0805 [142]2 years ago
6 0

Answer:

The idea that there are only two genders is sometimes called a “gender binary,” because binary means “having two parts” (male and female). Therefore, “non-binary” is one term people use to describe genders that don't fall into one of these two categories, male or female.

Explanation:

brainz plz

nalin [4]2 years ago
5 0

Answer:

Binary is a set of compiled human readable instructions for the CPU to interpret.

You might be interested in
A Ground Fault Circuit Interrupter (GFCI) works by comparing the amount of current going to and returning from equipment along t
Shtirlitz [24]

As the name states, during a ground-fault (when the current going out is significantly different than the current going in) the GCFI interupts the current.  Usually by a switch of some sort.  (Pushing the "test" button produces that click, and cuts off the current)

7 0
3 years ago
Read 2 more answers
In a network, a computer that performs specific services for other computers on the network is called a
klio [65]
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

8 0
3 years ago
PLEASE HELP I WILL REWARD YOU
xxMikexx [17]
What what what what what what
5 0
3 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
3 years ago
Which of the following statements is false? a. Racks and bins are examples of storage equipment. b. Automation refers to equipme
svp [43]

Answer:

b. Automation refers to equipment that complements, rather than replaces, human contact.

3 0
3 years ago
Other questions:
  • Respecting culture in the workplace means understanding that
    5·2 answers
  • 12. In 2009, __________ of all pedestrian fatalities were caused by impaired drivers
    9·2 answers
  • Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The
    11·1 answer
  • Pomógłbymi ktoś z takim zadaniem? C++
    8·1 answer
  • Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
    12·1 answer
  • What is the family access code right now?
    5·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • What is pollution?
    14·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!