1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
2 years ago
10

1. Give one reason why data is represented in binary in a computer [1]

Computers and Technology
1 answer:
RoseWind [281]2 years ago
3 0

Answer:

1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system

2) 8 bits

3) 1000000 bytes

You might be interested in
What happened to China and India after they modernized their workforces by providing more training and education?
dem82 [27]
The correct answer is D.
5 0
2 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
Briefly explain the emerging trends in micro computer technology in relation to size
77julia77 [94]

A microcomputer is a small device composed of a central CPU with a microprocessor. Microcomputers are also called personal computers (PCs) and they are ultimately easier to transport.

<h3>What is a microcomputer?</h3>

A microcomputer refers to a personal computer, which is similar to an IBM PC device machine.

The term microcomputer was used in the 1970s, nowadays they are called personal computers, and PCs are being increasingly better both in usage and transportability.

The average personal computer has a weight of 20-30 pounds, in the future, it is believed that there will be no need for a personal computer (all data will be in the cloud).

Learn more about personal computers here:

brainly.com/question/4945544

7 0
2 years ago
What is the purpose of a email
jasenka [17]

Answer:

An email is a digital message sent electronically from one computer to one or more other computers. Emails are flexible and can be used for giving instructions, serving as documentation, providing confirmation, communicating rules and procedures, making recommendations, providing a status update, making an inquiry.

7 0
3 years ago
Read 2 more answers
Explain why the fundamental software engineering principles of process, dependability, requirements management, and reuse are re
Georgia [21]

These principles are not explicit to one kind of program and are increasingly broad "best practice" rules that assist designers with composing code that is easier to maintain.

<u>Explanation:</u>

A set of programming guidelines that are executed to play out a particular undertaking according to the prerequisites of the client is known as programming. Every product has some essential standards to follow. In light of all product frameworks have basic quality traits, including accessibility, modifiability, execution, security and wellbeing, testability and ease of use, the key programming thoughts give basic arrangements or strategies to help those characteristics.

It is generally less expensive, over the long haul, to utilize programming designing strategies and methods for programming frameworks instead of simply compose the projects as though it was an individual programming venture.

8 0
3 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • During prereading, it is not important to pay attention to visual aids.<br> T f
    15·2 answers
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • Rule- based systems are subset of expert systems true or false?
    7·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • The first page of a website is what?​
    5·2 answers
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!