What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary

Answers

Answer 1
Answer:

Answer:

D. Binary

Explanation:

Computer hardware parts are built on transistors, small electrical devices that switch electrical signals and amplify power. The CPU (Central Processing Unit), the "brain" of the computer, has billions of tiny transistors alone.

These transistors read binary, a code made up of 1's and 0's. This code tells what the computer to do.

CSS, HTML, and HTML 5 apply to web pages and web page designs, not code for the computer.

The OS (operating system) that your computer runs is coded in C++ (Windows) or C (Linux)


Related Questions

Identify the subject: Computer graphics are amazing these days.a. graphics b. computer graphics, days c. amazing d. computer
The System Tools folder is usually found A. nested within the Accessories submenu. B. on the Windows desktop next to the My Computer icon. C. under Settings in the Start menu. D. on the Systems tab in Windows Help.
A web page without a bibliography, or sources, is an indicator of an unreliable site. Please select the best answer from the choices provideda. True b. False
You __ a worksheet to emphasize certain entries and make the worksheet easier to read and understand
The ____ package contains frequently used classes and is implicitly imported into java programs.

you are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation?

Answers

Answer:

Set a restore point, confirm system compatibility and turn off the system firewall.

Explanation:

The computer system is divided into hardware and software. The software includes the operating system software that manages the system functionality and application software that comes with the operating system or manually installed by the client.

Manually installed applications from unknown websites can sometimes introduce malicious software like rootkit, Trojan horse and virus to the system which are harmful.

To prevent this, set a restore point, so to be able to revert the installation if it is harmful and allow firewall access for proper installation.

Can't find the right year for this. (Attachment)

Answers

Apple iTunes in 2001 that sheet is wrong

The seven basic parts of a computer are

Answers

monitor, keyboard, CPU, mouse, and I believe the USB drive , DVD drive and hardware system
monitor, mouse, keyboard, computer data storage, hard disk drive (HDD), graphic cards, sound cards, memory (RAM), motherboard.

Amir wants to experiment with different positions for a floating shape object in a document. He should do which of the following? O a. Bring the shape forward. O b. Bring the shape backward. 0 с. Change the text wrapping of the shape. O d. Drag the shape to various positions.​

Answers

Answer: D

Explanation:

D. Drag the shape to various positions.​

Which of the following is an advantage of batch processing?It can balance computing resources by time.
It executes processing immediately.
It can leverage decision-making abilities.
Work can be shared on a variety of computers.

Answers

Answer:

it can balance computing resources by time

Explanation:

this this is as it involves multiprogramming

You are the administrator of an organization with a single Active Directory domain. One of your senior executives tries to log onto a machine and receives the error “This user account has expired. Ask your administrator to reactivate your account.” You need to make sure that this doesn’t happen again to this user. What do you do? (A) Configure the domain policy to disable account lockouts.(B) Configure the password policy to extend the maximum password age to 0.(C) Modify the user's properties to set the Account Never Expires setting.(D) Modify the user's properties to extend the maximum password age to 0.

Answers

Answer:

C

Explanation:

Modify the user's properties to set the Account Never Expires setting. This setting disables the Expiry setting for the password.so the user never get password expired message

The Answer is C