What is the name of the file that holds the 1's and 0's code for the CPU to execute/run?

Answers

Answer 1
Answer: The answer is binary file
Hope it helps<3

Related Questions

The ____ area on the status bar includes six commands as well as the result of the associated calculation on the right side of the menu.
Di bawah ini tampilan submenu pada tab menu insert pada microsoft word 2010,yaitu...A.tables C.paragraph B.font D.styles
Active space is important in which type of photograph?a.Landscape b. Close-up c. Still life d Motion
Which best describes the relationship between hardware and software?
Which are *three* best practices used in the core layer? a. Use routing with no Layer 2 loops. b. Limit VLANs to one closet. c. Use HSRP. d. Use GLBP. e. Use Layer 3 switches with fast forwarding. f. Use Layer 3 routing to the core. g. Use two equal-cost paths to every destination network. h. Use RPVST+ as the STP with multilayer switches.

Which of these scenarios depicts unethical workplace practice by an employee?A. monitoring employee movement during working hours
B. monitoring use of workplace resources
C. restricting Internet use
D. revealing confidential data

Answers

Answer:

D. Revealing confidential data.

Explanation:

Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. Imagine your bank records.

When confidential data is revealed it is very unethical at workplace.

Answer:

D. revealing confidential data.

Explanation:

Revealing confidential information is an extremely unethical workplace practice by an employee. Engaging in this type of behaviour is not only frowned upon, but can potentially be illegal. The reason for this is that employees are given a certain level of trust when they work at a company. Revealing confidential information violates this trust, and can risk the company's future.

The use of short, direct sentences with no fluff is known as what?

Answers

The question ask to complete the said sentence and provide the necessary word that could support the said sentence in your question and base on the question, my answer would be that it is known as a Business Style.  I hope that you are satisfied with my answer and feel free to ask for more 

Answer: A-  

Business style

Explanation:

Assignment: Earth’s Surface Exploration

Answers

Answer:

Stop waiting until the due date

Explanation:

Why you always wait until the last minute to turn in yo assignments

Which of the following is a form of mediated communication?a. CBS Evening News
b. Facebook
c. NPR Broadcast
d. Time Magazine

Answers

typically mediated communication is the use of any technical medium for transmission across time and space, or that is how Thus Davis defines it. i would say b, but it depends what sort of mediated communication you are referring to. but facebook is computer-mediated communication.

Where is the BIOS for your computer located?A. Within the CPU
B. In the PSU
C. In the motherboard
D. In the optical drive

Answers

The BIOS for your computer located in the motherboard

How to determine the location

The BIOS (Essential Input/Output Framework) for a computer is found on the motherboard. It could be a firmware that initializes the equipment components amid the boot prepare and gives fundamental communication between the working framework and the equipment.

The BIOS is ordinarily put away on a non-volatile memory chip on the motherboard, such as a ROM (Read-Only Memory) chip or an EEPROM (Electrically Erasable Programmable Read-Only Memory) chip, guaranteeing that it holds its settings indeed when the control is turned off.

Learn about computer at: brainly.com/question/24540334

#SPJ6

I believe the answer is C the motherboard!  

carl is a security engineer for his company. he is reviewing a checklist of measures to physically protect the network specifically and the office environment in general. what is he focused on?

Answers

Carl, as a security engineer, is likely focused on implementing physical security measures to protect the network and the office environment from unauthorized access or damage.Unauthorized access refers to gaining access to a computer system or network without the owner's permission or consent.

The physical security measures may include things like installing security cameras, implementing access control systems, ensuring proper cabling and wiring protocols are in place, securing server rooms and data centers, and ensuring that employees are following proper security protocols such as password management and data handling procedures to protect the network.

Essentially, Carl's focus is on ensuring the physical security of the network and the office environment to prevent any potential security breaches or threats.Physical security is an important aspect of overall cybersecurity, as it complements technical and administrative controls to ensure comprehensive protection of an organization's assets.

To learn more about security : brainly.com/question/28004913

#SPJ11