The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.

Answers

Answer 1
binary number system. With n bits you can create 2^n numbers.
Answer 2

Answer: the answer is binary code  

Explanation  binary is made of 1s and 0s


Related Questions

When might an lcd monitor experience distorted geometry?

Answers

The time when an LCD monitor is experiencing distorted geometry is when there is a presence of the screen into having a display that is not set on the resolution that is supposed to be in native, this is indicative that it is experiencing distorted geometry.

True or false while the internet and social media are vital for spreading campaign messages, television advertisements are considered ineffective

Answers

Salutations!

The answer is false. Social media, internet, television, are all effective to spread campaigns, news etc. This is the easiest and the fastest way to get information. All these sources are very strong and can reach information any where in the world within minutes.

Hope I helped (:

have a great day!

6 The part of the computer that contains the brain or central processing unit is also known as the ?

Answers

Answer:  "CPU" .
________________________________

Your teacher has asked you to do a report on water conservation, you find a website that explains it perfectly. You copy the paragraph off the website, but you change a few words and type it on your own document. Is that plagiarism? Yes or No?

Answers

Yes, because you are using someone else's ideas and have not given them credit. 
Personally, I would say that it is not. But to be honest, it really is. So the answer is yes.

Which term describes the time it takes to process an order from the time the order is received from the customer until the order is delivered?

Answers

Delivery time, however, on most occasions there will be a dispatch and shipping time, which together make up the delivery time. Dispatch time is the time it takes for an item to be sent after an order has been placed. The shipping time is the time it takes from the moment the item is sent until it arrives at its intended destination.

Final answer:

The term for the duration from receiving a customer's order to delivering it is called lead time. It is a critical factor in business, especially in areas like Organizational Behavior and Supply Chain Management, influencing customer satisfaction and operational efficiency.

Explanation:

The term that describes the time it takes to process an order from the time the order is received from the customer until the order is delivered is known as lead time. In the context of Richard's Furniture Company, we can use a model to predict customer arrival times and the order processing duration. This company delivers continuously between 10 a.m. and 2 p.m., and we are looking at how long past the start time individuals wait for their delivery on average. If one customer arrives every two minutes, it will take on average six minutes for three customers to arrive. The probability calculations based on customer arrival times can also be derived from this information, addressing questions about the likelihood of customers arriving within a certain timeframe after the previous customer.

This understanding is critical in the Business field, particularly within the areas like Organizational Behavior and Supply Chain Management, as it directly influences customer satisfaction, inventory levels, and operational efficiency. Companies must consider every stage of the product or packaging life cycle, from raw material acquisition to end-of-life, to optimize the lead time. Practical business scenarios, such as negotiating with suppliers and shipping arrangements as seen in the example where a firm's favorable shipping contracts allowed for significant savings, illustrate how lead time can be a crucial component in strategic decision-making.

In a newspaper advertisement for a hybrid car, which of these presentation methods would be most effective
A. Chart showing the rising price of gas
B. A list of the most expensive gas station in the city
C. Technical diagram of the hybrid engine and why it works
D. A quote from a famous actress on why she bought a hybrid

Answers

Your answer is a....
A; chart showing rising price of gas.

One benefit of hybrid cars is that you have to spend less on gas. Showing people that they will indeed be saving more and more money as gas prices rise is a great motivator to get a hybrid car.

Converting from type ________ to type ________ will result in the loss of data.
a. bool, char.
b. float, double.
c. int, char.
d. short, long

Answers

Converting from a type with greater capacity (double) to one with lesser capacity (float) poses a risk of data loss due to differences in precision and range. The conversion from float to double itself does not result in data loss.

When converting from one data type to another, particularly in programming languages that are strictly typed, it is important to consider whether the conversion will result in a loss of data.

The loss of data can occur when converting from a type with a greater capacity to store information to a type with a lesser capacity. In the options provided:

bool to charfloat to doubleint to charshort to long

The conversion that will most likely result in a loss of data is from float to double. This is because a 'float', or floating-point variable, typically has less precision and a smaller range compared to a 'double', or double-precision floating-point variable.

Therefore, when converting from a float to a double, the precision of the value may not change, and thus no data is lost; however, the reverse conversion from a double to a float can result in loss of precision and potentially also in the loss of range.

The most common wireless technology for tv and dvd remote control devices is _______.

Answers

I think it "IR" aka "infrared". IR is used in about 99% of tv and DVD player remotes. IR is an invisible light that shoots out of your remote. It can't be seen by the naked eye, but some cellphone cameras can pick it up ( fun fact )

What is the three letter acronym for a network that serves just your office?

Answers

A Local Area Network, or LAN.

What is the range of the well-known ports used by tcp and udp?

Answers

/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.

The _____ is a storage location for text awaiting pasting.

Answers

What's your answers? 

Answer:

Explanation:

Clipboard

Compare volatile and nonvolatile devices. Which one would be better for long-term data storage?

Volatile, because it can only be accessed by those with a password

Volatile, because the data is lost once the computer is turned off

Nonvolatile, because the data is not lost once the computer is turned off

Nonvolatile, because it is less likely to become corrupted

Answers

The answe is
Nonvolatile, because the data is not lost once the computer is turned off 

Nonvolatile memory = your hard drive
Volatile memory = RAM inside the computer. This memory is wiped when the computer shuts down and starts back up.

Answer:

Nonvolatile because the data is not lost once the computer is turned off

Explanation:

For long term storage purpose it is essential to use the Nonvolatile device because Data stored in it is not lost once the system is turned off. while Volatile devices tend to loss data stored in them once the system is turned off.

Volatile devices are better used when high speed data access is required while nonvolatile devices are used for longer -term data storage purposes examples of nonvolatile devices includes: hard disks, re-writable optical disks. and  a common example of volatile device is RAM.

What command would you issue from the command prompt to test whether your computer has connectivity to the network?

Answers

ping ${myDefaultRoutersAddress}

Personally, I'd probably run ifconfig to see my network setups. Then I'd need to run "netstat -rn" to get my default router's address.

The command to display the word unix in quotation marks is:

Answers

echo '"unix"'




----------------------------

When investigating a mobile device, after determining the device is safe to handle, network connectivity should be disabled to avoid:?

Answers

The network connectivity should be disabled when investigating a mobile device so that there will be prevention of connection with the device and that the evidence will be maintained in a original condition without having any interferences with other networks if it has been turned on.

Match the appropriate technology to the task. 1. Create a technical drawing of a building. diagramming software 2. Enhance a photograph. CAD 3. Create a process flow. automated fingerprint verification 4. Display a slide-show presentation. projector 5. Verify a person's identity. image-editing software 6. Read and send information by way of a radio signal. radio transceiver

Answers

1) CAD
2) image editing software
3) Diagramming software
4) projector
5) automated fingerprint verification
6) radio transceiver

Answer:

1. Create a technical drawing of a building: CAD

2. Enhance a photograph: Image editing software

3. Create a process flow: Diagramming software

4. Display a slide-show presentation: Projector

5. Verify a person's identity: Automated fingerprint verification

6. Read and send information by way of a radio signal: Radio transceiver

Juliet is trying to increase her savings account and she decides that she is going save an additional $700 every month. If her monthly take home pay is $5,430, what proportion of her monthly take home pay is she saving?

Answers

Her monthly proportion that she is saving of her monthly take home pay is 12%

Under extreme programming, ________ and ________ are intimately related parts of the same process

Answers

The answer to this question is: coding and testing
Extreme programming is a software development methodology that aim to improve software quality by measuring whether the technology can be used to fulfill customer's requirement.
To actually get somethings that is accepted by the customers, various coding and testing the software will be done constantly
Coding and testing is the answer.

An email ____ consists of the computers and software that provide email services.​

Answers

I think it could be email server?

Hard drives have the largest capacity of any storage device.
a. True
b. False

Answers

it's false as they store way lesser than we think
The answer is true. It does have the largest capacity of any storage device


Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automatically. which type of server do you need for this?

Answers

DHCP (Dynamic Host Configuration Protocol)

90-95% of the population of the Ohio River Valley has been exposed to Histoplasma capsulatum, but relatively few individuals are diagnosed with histoplasmosis. Why is this so?

Answers

Histoplasmosis is an infection caused by the fungal species known as Histoplasma. It thrives in soil that contains high levels of bird or bad droppings. Even though over 90 percent of the Ohio Valley has tested positive for exposure only persons with weaker immune systems and certain jobs or situations seem to get infected. High risk jobs include agriculture, roofing, construction or being in an environment with bird droppings. 
A healthy immune system clears the infection before signs and symptoms can appear in these individuals.

To join two or more objects to make a larger whole is to _____________ them.
a.

regulate
b.

compliment
c.

integrate
d.

correlate

Answers

C. Integrate

Integrate means to make a object larger by joining another to it

hope this helps

Answer:

It is integrate

Explanation:

Got it right on Edge :)

One purpose of the dual ignition system on an aircraft engine is to provide for?

Answers

It is done to provide for better engine performance. It is important for two main reasons. One is that if one ignition system fails the other can for a time take care of it and hold its ground until you land or fix it. Another is that it is used for more efficient consumption of fuel and air which makes the engine work better.
Answer: Redundancy

Explanation:
An aircraft is a system that cannot tolerate faults or errors because the consequences can  be fatal.
Therefore the ignition system is an excellent design candidate for redundancy.
Redundancy ensures that if the primary ignition system fails, a reliable backup ignition system will be available.

Another example of redundancy is the use of electric power generators in a hospital. They back up the primary electricity power supply because failure of electric power during surgery cannot be tolerated.

Why is it important to back up data on a computer before you burn-in test the cpu?

Answers

A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.

How do you think engel would feel about computers information systems and the internet?

Answers

Final answer:

Friedrich Engel might express mixed feelings about computers, information systems, and the Internet, appreciating their efficiency while worrying about their capacity for class stratification and control. The evolution from a government network to a global economic and social platform may reflect both the potential and perils these technologies represent in accordance with Engel's perspective.

Explanation:

Friedrich Engel, one of the founders of Marxist theory, might hold mixed feelings about computers, information systems, and the Internet. On one hand, he may appreciate how these technologies enhance productivity and communication, aligning with his views on the progression of societal systems. On the other hand, he might harbor concerns about their potential to exacerbate class distinctions and control by powerful entities. It's evident that the Internet's origin as a scientific/government network positioned it as an information-sharing platform that evolved into today's Internet, heavily influencing global commerce, communication, and culture.

Take, for instance, how digital technology is often likened to the steam engine during the industrial revolution. Prominent figures such as Steve Jobs and Bill Gates are compared to industrial magnates due to their significant influence on the societal embrace of digital media. The transition into the information age introduced hope for progress but also anxiety concerning the rapid change and its implications on privacy and control, reminiscent of concerns Engel might express.

Further examining the impact, the Internet indeed has revolutionized personal and professional realms, evidenced by the near-universal reliance on tech across various sectors, and the significant role it plays in shaping relationships, culture, and politics globally.

Which is not a tool hackers use to gain access to and take control of your computer?

Answers

A rat/ or kalilinux is used to take over your computer but Kalilinux is a linux program most hackers use it to do all types of stuff with it if not to use kali the other software is a rat witch can take control of your whole computer and a rat is a virus witch is hard to get away from 

Select each procedure that could harm the computer and cause it to work improperly. Download software from the Internet without permission. Wash your hands thoroughly before using the computer. Turn the power off on the computer before shutting down. Gently type on the keyboard. Set your water bottle near electronics.

Answers

Hello! I would believe that the answer should be: Either Turn the power off on the computer before shutting down. Or Download software from the internet without permission. Please clarify what your lesson is about so I can give you a true answer.

Answer:

Download software from the Internet without permission.

Set your water bottle near electronics.

Explanation:

In linear programming a solution that does not simultaneously satisfy all constraints is called an

Answers

When it comes to linear programming, the solution which would be effective in satisfying all constraints in the given program in a simultaneous matter is called that of feasible programming. This is due to the fact that the program can satisfy all requirements at the same time.

Which network tier forms the internet backbone?

Answers

Tier 1 Tier 1 providers have the largest and fastest network connections available. A reasonable definition of a tier 1 provider is a network that can reach every other network on the Internet without purchasing IP transit or paying for peering. You might consider a Tier 1 network to be an ISP for other ISPs. Because of their extremely good connectivity, other network providers pay Tier 1 networks to carry their data for them to other locations. As of this time, there are less than 20 Tier 1 network providers worldwide.

Option (A) Tier 1 networks form the Internet backbone. These networks do not pay for Internet transit and exchange traffic with other Tier 1 networks.

Tier 1 networks are the backbone of the Internet. These networks do not pay for Internet transit because they exchange traffic with other Tier 1 networks. They have the infrastructure and agreements necessary to carry traffic across long distances and between countries, essentially forming the core of the entire Internet.

Examples:

AT&TCenturyLinkNTT Communications

These companies are some of the major Tier 1 network providers that connect various ISPs and large corporations to create the Internet backbone.

Correct Question

Which network tier forms the Internet backbone?

a. Tier 1

b.Tier 2

c. Tier 3

d. Tier 4

Other Questions
What does tacit mean? What type of map would most likely be used to show distribution of soybean farms in Illinois If 3 is added to twice a number and this sum is multiplied by 2, the result is the same as if the number is multiplied by 3 and 4 is added to the product. what is the number? A savanna is likely to be found in 6,700 rounded to nearest thousand What kind of reaction adds water to break large molecules into subunits? The density of gold is 19.3 g/cm3. What is the mass of 15cm3 of gold? A(n) ______ database stores data in tables that consist of rows and columns. What happens after a supreme court Justice is appointed? What transformation is represented by the rule (x, y)(y, x)?A. reflection across the x axisB. rotation of 90 degrees clockwise about the originC. reflection across the y axisD. rotation of 180 degrees about the origin What was the espionage act What natural boundary helps form the border between the united states and mexico? Gulf of Mexico, Atlantic Ocean, Great Lakes, Rio Grande jackson wants to divide 3\4 pound box of trail mix into small bags each of the bags will hold 1/12 pound of trail mix how many bags of trail mix can jackson fill What did the Indus River Civilization Valley value? When you save a file to the cloud, it means your file stored _________ Text effects can only be applied to numbers. True False In what century was Georgia founded? what is the answer to a/164363 -10 = 10 What is virgil's advice to dante as spoken at the gate of hell? What theme does the following excerpt from Franz Kafkas The Metamorphosis deal with? Hearing these words from his mother made Gregor realise that the lack of any direct human communication, along with the monotonous life led by the family during these two months, must have made him confusedhe could think of no other way of explaining to himself why he had seriously wanted his room emptied out. Had he really wanted to transform his room into a cave, a warm room fitted out with the nice furniture he had inherited? That would have let him crawl around unimpeded in any direction, but it would also have let him quickly forget his past when he had still been human. He had come very close to forgetting, and it had only been the voice of his mother, unheard for so long, that had shaken him out of it. Nothing should be removed; everything had to stay; he could not do without the good influence the furniture had on his condition; and if the furniture made it difficult for him to crawl about mindlessly that was not a loss but a great advantage Steam Workshop Downloader