1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
2 years ago
13

How many binary digits are in 10^100.

Computers and Technology
1 answer:
Basile [38]2 years ago
8 0

Answer:

333 binary digits.

Explanation:

You might be interested in
Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
iris [78.8K]

Answer:

require direct line-of-sight scanning.

Explanation:

Unlike radio frequency identification (RFID) tags, bar codes require direct line-of-sight scanning. Meaning you need a device that can scan the bar code and the scanner needs to be directly pointing at the barcode without anything in the way. This is because bar codes work by embedding the information in a design of lines that need to be scanned to retrieve the information. If anything gets in the way it interrupts the scanning process and the data is not correctly transmitted. RFID tags on the other hand do not need a direct line of sight since the information is transferred through radiofrequency. This allows the data to be transferred without a line of sight and at a distance of up to 300ft.

8 0
3 years ago
What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
lianna [129]
Because he needed ligh
7 0
3 years ago
Publishing is copying Web pages and associated files to a Web<br> server. T or f
sineoko [7]
The answer would be true.
4 0
3 years ago
What is the difference between ‘’ and “” string type in python?
Mekhanik [1.2K]

Answer:

There is no difference between ‘’ and “” string type in python. Both are used to hold the string or sequence of character in the python. triple """ """ can also use for the same.

Example:

str1 = "aeiou"

str2 = 'aeiou'

str3 =""" hello"""

print(type(str1), type(str2),type(str3))

<class 'str'> <class 'str'> <class 'str'>

Here all are used to hold string or sequence of character.

6 0
3 years ago
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
Other questions:
  • Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
    14·2 answers
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • Which type of choir often sings AND dances while they perform?
    9·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • How to write my name in binary code ? Rivas
    7·2 answers
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!