1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
11

What is number system?​

Computers and Technology
1 answer:
MrMuchimi3 years ago
8 0

Answer:

A numeral system is a writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner. The same sequence of symbols may represent different numbers in different numeral systems.

Explanation:

You might be interested in
What is the value stored in the variable myNum after the following assignment statement executes? myNum = 23 % 5
netineya [11]

Answer:

% is a modulus operator in most languages, returning the remainder when the preceding number is divided by the following one .  Assuming the language this question pertains to is one of those, then the answer is 3.

7 0
3 years ago
16. (PPT) You can use features on the Video Tools Playback tab to adjust how and when the video plays during the slide
Nezavi [6.7K]

Answer:

a. True

Explanation:

5 0
2 years ago
When you take photos with your smartphone or camera, the files are most likely stored on which type of storage device A. Compute
kaheart [24]
C. flash memory card
8 0
4 years ago
Read 2 more answers
Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
vladimir1956 [14]
Hey How are you fine?
3 0
4 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Other questions:
  • Steffie wants to change the margins of a worksheet to Normal to align it better on a printed page. To do this, what can she do a
    5·1 answer
  • What operating system uses Fastboot?
    10·2 answers
  • Clicking a _____ name opens a drop-down list of commands and options.
    6·1 answer
  • 1841 William Henry ____________ patents the Calotype process, exposing wet (instead of dry) paper for a much shorter amount of t
    14·1 answer
  • The Middle East links which two countries
    10·2 answers
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • A/an<br> controls the flow of data between a computer and the network.
    8·1 answer
  • Hosts A and B are 20 000 km away from each other. The propagation speed of the link between them is 25000 mps. The data is place
    9·1 answer
  • Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
    8·2 answers
  • You work as a computer technician for a production company that travels all over the world while filming and editing music video
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!