1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
7

How to write my name in binary code ? Rivas

Computers and Technology
2 answers:
wel3 years ago
3 0

Your name in binary would be "01010010 01101001 01110110 01100001 01110011"

trapecia [35]3 years ago
3 0

Answer:

Rivas = 01010010 01101001 01110110 01100001 01110011

Explanation:

R = 01010010

i = 01101001

v = 01110110

a = 01100001

s = 01110011

01010010 01101001 01110110 01100001 01110011 (Rivas) is your name in Binary Code.

You might be interested in
Which Internet connection type tends to use shared bandwidth?<br> Cable<br> Dial-up<br> DSL<br> ISDN
zmey [24]

Answer:

try dial-up

Explanation:

3 0
2 years ago
Read 2 more answers
The Early Days (Pre-Mechanical Period)​
Irina18 [472]

Answer:

The earliest age of technology. It can be defined as the time between 3000 B.C. and 1450 A.D. When humans first started communicating, they would try to use language to make simple pictures – petroglyphs to tell a story, map their terrain, or keep accounts such as how many animals one owned, etc.

<h2>Please mark me as brainliest</h2>

7 0
2 years ago
Drag each tile to the correct box.
garri49 [273]
I think select the video insert select the movie option under illustrations resize the video player then select the insert tab i’m not 100 percent sure tho
8 0
3 years ago
Read 2 more answers
What's a big question or problem in the tech field you'd like to solve and why?
aleksandrvk [35]

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

5 0
2 years ago
The county clerk's office is writing a program to search their database for citizen records based on information about that citi
Alborosie

Answer:

The correct pseudocode to find the records of all citizens over the age of 50 is IF(age > 50).

OR EACH item IN citzlist

{

WHILE(not end of citzlist)

{

IF(age > 50)

{

DISPLAY(name)

}

}

}

If this is run, it will bring out all the names of the citizen who are over the age of 50 in the list.

Explanation:

6 0
3 years ago
Other questions:
  • give two main reasons that should be considered when preparing and deploying a functional restoral scenario.
    5·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested use
    6·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​
    9·1 answer
  • Documental acerca de los principales materiales que se emplean en la fabricación de medios técnicos utilizados en una oficina.
    9·1 answer
  • Why optical disk is slower than magnetic disk.?​
    9·2 answers
  • Classify computer based on signal
    14·1 answer
  • Compare and discuss between electromechanical and electronic era of computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!