1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
14

What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary

Computers and Technology
1 answer:
Ugo [173]3 years ago
4 0

Answer:

D. Binary

Explanation:

Computer hardware parts are built on transistors, small electrical devices that switch electrical signals and amplify power. The CPU (Central Processing Unit), the "brain" of the computer, has billions of tiny transistors <em>alone</em>.

These transistors read binary, a code made up of 1's and 0's. This code tells what the computer to do.

CSS, HTML, and HTML 5 apply to web pages and web page designs, not code for the computer.

The OS (operating system) that your computer runs is coded in C++ (Windows) or C (Linux)

You might be interested in
Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
TiliK225 [7]

Answer: Have you gotten an answer yet?

6 0
3 years ago
Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = '
LekaFEV [45]

Answer:

#include <stdio.h>

int main(void) {

char letterToQuit = '?';

int numPresses = 0;

printf("Press the %c key %d times to quit ", letterToQuit, numPresses);

return 0;}

Explanation:

in print statement %c is replaced by value of  variable 'letterToQuit'and %d is replaced by value of variable 'numPresses'

3 0
3 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
In gaming, "rendering" refers to:
jarptica [38.1K]
 The answer to your question is, rendering is<span> the process of generating an image from a 2D or 3D model.</span>
5 0
3 years ago
Read 2 more answers
_____ refers to displaying information for the user's view.
Fantom [35]
It is A outputting (if you want I can show what it says in the dictionary)
7 0
3 years ago
Read 2 more answers
Other questions:
  • Name size of machine screw that is used to secure switches and receptacles to device boxes
    13·1 answer
  • ​A(n) ____ will hold an online auction buyer’s payment until he or she is satisfied that the item bought matches the seller’s de
    13·1 answer
  • 3. Which of the following statements is true of a time management plan? 35 POINTS
    9·2 answers
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • How much time per day does the average U.S. youth spend watching television, playing video games, or using a computer?
    8·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • 1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
    10·1 answer
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!