1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
2 years ago
11

"code is broken down by the computer until it is in _____and is a very long series of ons and offs

Computers and Technology
2 answers:
Luden [163]2 years ago
8 0

Answer:

I'd say that the answer is Binary because it wouldn't be code, decode, or logic and Binary is the only one that makes sense and i got it correct when i did the exam.

Explanation:

Ivanshal [37]2 years ago
7 0

Answer:

Binary

Explanation:

Binary is 0 and 1, true and false, on and off. It is the only language machines can understand.

You might be interested in
What is the advantage of using the Publish Online option for sharing a calendar? It creates a web version that can be viewed by
kotykmax [81]

Answer:

its D. it allows a user outside an organization to view the calendar.

Explanation:

i just got it right on edge 2020.

7 0
3 years ago
Read 2 more answers
What are the reasons why is it necessary to evaluate online sources and content?
marissa [1.9K]
1) You don't know if the source is reliable. 
2) It is better to cite reliable sources so.
7 0
3 years ago
Diane wants to maintain a record of grades she scored in the fifth, sixth, and seventh grades. She enters her grades and the tot
sammy [17]
The answer of the given question above would be the second option: NUMBERS. Based on the given scenario above about Diane who wants to maintain a record of grades she scored in the fifth, sixth, and seventh grades and enters  her grades and the total percentage she scored in a spreadsheet, the tab o<span>n the Format Cells dialog box that will enable her to display the total percentage symbol in the spreadsheet would be the Numbers. Hope this helps.</span>
6 0
3 years ago
Read 2 more answers
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
What is an icon or animation used to represent aparticipant in an internet chat referred to as?
Veronika [31]
Emoji is an icon or animation used to represent a participant in an internet chat.
8 0
3 years ago
Other questions:
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • A(n) ____ path is a path used for external links that includes the complete address for the destination page, including the prot
    12·1 answer
  • Explain why the fundamental software engineering principles of process, dependability, requirements management, and reuse are re
    15·1 answer
  • "What is the capital of Belarus?" is an example of what type of search query
    10·2 answers
  • Have fire have ....<br><br>babi​ from babi098
    7·1 answer
  • س2) اکتب خوارزميه لحل المعادلة الرياضيه الاتيه
    9·1 answer
  • On mad max ps4, why does the v6 sound beter and healthier than the v8
    8·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!