1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
10

1. Give one reason why data is represented in binary in a computer [1]

Computers and Technology
1 answer:
RoseWind [281]3 years ago
3 0

Answer:

1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system

2) 8 bits

3) 1000000 bytes

You might be interested in
The engineering firm you work for is submitting a proposal to create an amphitheater at a state park. Proposals must be submitte
NISA [10]

Answer: Accessibility

Explanation: Accessibility is the term that defines the availability of the data to the people and resources that has disability towards reaching it in accordance with technical communication. Certain regulations are made for the making the accessible documents.

The  divider tabs and index are put into every proposal binder so that every member is able to get knowledge about the content of the proposal .Thus, every person can access the three ring binder for gaining information about the creation of amphitheater.

8 0
3 years ago
What is a systems development life cycle?
gogolik [260]

Answer: D) The overall process for developing information systems from planning and analysis through implementation and maintenance.

Explanation:

System development life cycle(SDLC) is the mechanism in the cyclic form for describing about the development stages of information system.The stages involves in production of system are analysis, design, implementation, planning and maintenance. It is used for making non-technical as well as technical models of information systems.

Other options are incorrect because high stage planning, feature description or evaluation of end-users business is not done by SDLC(System development life cycle) models.

Thus, the correct option is option(D).

7 0
4 years ago
What does the action tool allow you to do in Microsoft power point?
pickupchik [31]
I believe the answer is A. Add animation to clip art and text 
6 0
3 years ago
A ____________ is a collection of infected IT devices that an attacker or attack group controls.
sattari [20]
The answer would be a Botnet .
8 0
2 years ago
3 Points
gulaghasi [49]

Answer: Well, In my Opinion it would Be D! because these day people stick together with the internet!. If she adopt her Online business then she would be able to earn profits and also she can serve the people! Slowly people will get to know her business! That will be good for her!

<h3>I hope this works! :)</h3>

3 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Which of the following queries can have a Fully Meets result? Select all that apply. True False [adobe website], English (US) Tr
    7·1 answer
  • How can the output of a command be redirected to a file instead of being displayed on the computer's screen?
    9·1 answer
  • Which best explains what Grace did with the revisions?
    7·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
    9·1 answer
  • This inventor made their own fortune. They had little to no help in become one of the first black millionaires. They invented a
    9·1 answer
  • Use the drop down menu to complete the sentences about changing and customizing the calendar view in outlook 2016​
    10·2 answers
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
  • You just upgraded five computers with new, larger, hard drives. Now you would like to securely repurpose the old hard drives so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!