1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
6

HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES

Computers and Technology
1 answer:
katovenus [111]3 years ago
8 0

Answer:

the binary for the first one is 1101

and the binary for the second one is 10100

Explanation:

You might be interested in
What is the diffrence between the the grassland and the savanna biomes
sergey [27]

Answer:

The term "savanna" is often used to refer to open grassland with some tree cover, while "grassland" refers to a grassy ecosystem with little or no tree cover.

Explanation:

5 0
3 years ago
Read 2 more answers
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
2 years ago
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
JOIN GO.OGLE CLASSROOM IF YOUR A FAN OF FRANK OCEAN
Mrrafil [7]
Yes i agree perfectly
3 0
3 years ago
Read 2 more answers
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Other questions:
  • By default, a word document generally displays in ____ view.
    9·1 answer
  • What do radio telescopes use to gather and focus radio waves?
    14·2 answers
  • Conversion of a continuous stream of sound into a series of ones and zeroes that can be interpreted by computers results in
    12·1 answer
  • ______The statement #include &lt; math.h &gt; defines the name of the current program you are writing as "math". (T/F)
    10·2 answers
  • Which of the following is not a key component of a structure?
    12·1 answer
  • Write a program that allows the user to continuously input the value n until a negative number is entered
    10·1 answer
  • Tell the story, step by step, of how your computer finds the CodeHS server,
    9·1 answer
  • Nora has shared a document with others, and she needs to be able to easily identify when others are modifying the
    5·1 answer
  • daniel wants to buy a computer to use for playing games after work. he loves racing games and wants to make sure his device has
    9·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!