1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
2 years ago
11

Why is the computer uses binary why not trinary?​

Computers and Technology
1 answer:
Ray Of Light [21]2 years ago
3 0

Explanation:

because they only function with that one the gates also prevent it from being able to use it

You might be interested in
you just finished creating an expense report table, but your boss tells you to create an extra column representing non-productio
Margaret [11]
If you are using Microsoft Excel, then that would be easy.
In a spreadsheet, there are rows and columns. Click the row or cell adjacent to the new column that you will be adding. In versions of MS Excel 2007 and up, here's what you are going to do. In Home Tab, you can find "Insert" button. Click "Insert", then select "Insert Sheet Columns."
5 0
3 years ago
Design a module named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prom
Sergeu [11.5K]

Explanation:

Module getNumber (Integer Ref Value)

Display "Display a number"

Input number

End module

Module main ()

Declare Integer number x = 1

Declare Real number y = 2.5

Display( x, " " ,y)

Call changeUS (x,y)

Display( x, " " ,y)

End module

5 0
3 years ago
The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
sergiy2304 [10]

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

6 0
3 years ago
Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
nydimaria [60]

Answer:

C) Storage

Explanation:

I am sure of it.

5 0
3 years ago
PLEASE HELP ON THESE 3!! ILL GIVE A BRAINLIEST IF ITS CORRECT!!
Travka [436]
Not entirely sure about 1; I believe it's D. 2 is C, and 3 is A.
5 0
3 years ago
Other questions:
  • In three to five sentences, describe how you can organize written information logically and sequentially
    8·1 answer
  • Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher sp
    6·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Compound conditions require a computer to sense whether multiple conditions are true or false.
    9·1 answer
  • Edhesive unit 4 test answers
    15·1 answer
  • it is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together​
    15·2 answers
  • Edhesive 9.3 code practice
    11·1 answer
  • What is e banking effects
    7·1 answer
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!