1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
2 years ago
9

What is the name for the base-2 system used by computers to represent

Computers and Technology
1 answer:
NemiM [27]2 years ago
7 0

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

You might be interested in
In 1-2 sentences describe how to use the thesaurus in the Word Processor
mylen [45]
The Word processor Thesaurus changes plain vocab into stronger, not commonly used words.
5 0
3 years ago
Read 2 more answers
What is the computer system cycle called?
natita [175]

Answer:

he fetch–decode–execute cycle, or simply the fetch-execute cycle

mark me brainliestt :))

3 0
2 years ago
If you were to design a range of athletic shoes for various sports activities, what key factors would you consider during the de
mylen [45]
With this you just have to think about what do different shoes do and why? For example, track shoes need to be extremely light to make it so the runners don't need to move excess weight to accelerate faster whereas basketball shoes can be heavier because they need high ankle coverage for more ankle support during moves like the crossover. Then the key factors that I would do personally are: difficulty to produce, benefit to athlete, cost to athlete, weight, and support. My advice would be to systematically go through a bunch of sports and talk about each of their shoes...
4 0
3 years ago
Why do you feel an organization has multiple layers of security in place to protect its operation?
aalyn [17]

The purpose of including multiple layers in your network security<span> is to make sure that </span>each single defense component has a backup<span> in the case of a flaw or missing coverage. The individual strengths of each layer also cover any gaps that other defenses may lack.</span>

With this assumption in mind, each individual layer in a multi-layered security approach focuses on a specific area where the malware could attack. By working in concert, these layers of security offer a better chance of stopping intruders from breaching company networks than using a single solution.

The types of security layers you can use in your network defense include:

<span>Web protectionPatch managementEmail security and archivingVulnerability assessment and analyticsAntivirus softwareData encryptionFirewallsDigital certificatesAnti-spam and spam filtersPrivacy controls</span>

<span>Having multiple layers of security in place is crucial for MSPs who protect data at all levels and across numerous applications and devices. Not only should data stay safe, but so should the methods of communication and the network where information is transferred.</span>

4 0
3 years ago
Which strategies for effective presentations is Ian using in his opening? Check all that apply.
Fofino [41]

Answer:

A. using a hook in his opening

B.  detailing the speech’s objectives

E. letting his audience know what to expect

Explanation:

Opening his speech using a quotation is a strategy of using a narrative hook, or simply hook, by Ian. Giving a grand and enticing opening is what makes an audience to pay attention and listen to what the speaker has to say in his speech. So, first strategy used by Ian is using a hook in his opening.

Another strategy used by Ian is giving objective details of his speech. By outlining what he will be covering in his speech, Ian is letting his audience know what to expect from the speaker and his speech, and also gave details of his speech.

So, option A, B, and E are correct.

5 0
3 years ago
Read 2 more answers
Other questions:
  • You are reluctant to write an extra credit book report because you are afraid that your language and punctuation skills are not
    11·1 answer
  • The acronym is used to define the process that allows multiple devices to share a single routable ip address.
    6·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • The second step when using the problem-solving process is to
    7·1 answer
  • A variation of pronounce is a. Proclaim c. Produce b. Profound d. Pronunciation Please select the best answer from the choices p
    11·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Write a 2 paragraph on an African American who has become successful in IT. Need help asap can’t think of anything
    5·1 answer
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!