Will give brainliest!
Who created binary, and does anyone have any idea how?

Answers

Answer 1

Answer:

Gottfried Leibniz created it and Leibniz was trying to find a system that converts logic's verbal statements into a pure mathematical one.


Related Questions

Good Morning! Please Help Me With This New Question!

In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

What is 01010101 converted to denary

Answers

Answer:

85

Explanation:

0 + 64 + 0 + 16 + 0 + 4 + 0 + 1 = 85

What is one benefit of Powerpoint Online?
A.) PowerPoint Online is the full version of the Powerpoint application.
B.) Only one user has access to and editing rights for a presentation at a time.
C.) PowerPoint Online is not password protected, which makes it easier to use.
D.) Presentations can be shared and reviewed by several users on the internet.

The answer is D.)Presentations can be shared and reviewed by several users on the internet.

Answers

Answer:

D) Presentations can be shared and reviewed by several users on the internet.

Explanation:

One benefit of Powerpoint Online is that Presentations can be shared and reviewed by several users on the internet.

What is PowerPoint presentation?

PowerPoint can include a pictorial presentation to communicate a particular information or idea.

The slide can be share among individuals to give them access to the information.

Therefore, One benefit of Powerpoint Online is that Presentations can be shared and reviewed by several users on the internet

Learn more on PowerPoint below

https://brainly.com/question/23714390

#SPJ9

What uses HTML hypertext links that users can click to access different locations or information?

Answers

Answer:

a button

Explanation:

I am not too familiar with HTML terminology (self-taught), but button (classes?) use hypertext links to access different locations on a website.

I'm pretty sure the syntax is something like <button = *stuff*>

HELP. PLZZZZZZZZ. ASAP


Dropdown.


You defined the raft class as shown.

class raft:
def __init__(self,capacity):
self.capacity = capacity
self.location = 'Gauley'
self.repairs = []
The code, raftA = raft(45), creates a(n) of the raft class.


instance

function

method

constructor

Answers

Code, raft A = raft(45), creates a(n) self of the raft class.

What is raft class?

Code is a term used to describe a set of rules or instructions expressed in a specific computer language.

Raft is a mechanism that ensures that every node in the group of computer systems accepts the same set of state transitions and is universal for spreading state machines among them.

Therefore, Using the raft consensus technique for both the election of the leader and data replication,  raft A = raft(45), creates a(n) self of the raft class.

Learn more about raft class, here:

https://brainly.com/question/21709647

#SPJ1

Workers in a child care facility or preschool are part of what career path?
A. education and training
B. health care
C. human services
D. hospitality

Answers

Answer:

A

Explanation:

Preschool teachers show education

A. Education and training

1. Is the function void or return
a. void
b. return
2. What is the result of the following expression: int r = 3; r%2 == 0;
a. it evaluates as true
b. it evaluates as false
c. nothing happens

Answers

Answer:

(a) void

(b) Nothing happens

Explanation:

Solving (a): void and return

A function that returns no value is referred to as a void function.

On the other hand, a void can not be return or named return.

So, the function is void

Solving (b):

r = 3

Required

The result of r%2 == 0

Substitute 3 for r in r%2 == 0

3%2 == 0

3%2 is 1.

So, we have:

1 == 0

Hence, the equivalent of r%2 == 0 is 1 == 0.

However, nothing will happen because there is no instruction attached to the statement (i.e. r%2 == 0;)

Which of the following are advantages of automatic updates?

Answers

Answer:

I think maybe b or d

Explanation:

Answer:

It's A, B, and D

Explanation:

Use the drop-down menus to complete each of the following sentences. Choose the best answer. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to _______. Sleep mode and Hibernate mode are ________ that help you safely put your computer in a low-power state when you’ll not be using it for a period of time. Cleaning dust from your keyboard, monitor, and fans should be done _______. Magnets _______ a computer’s performance. Heat, humidity, and cold can damage a computer’s _______. You should check all computer cords for the safety of _______.

Answers

Answer:

1: eject them

2: power-saving modes

3: regularly

4: may damage

5:internals and externals

6: you and the computer

Explanation:

Answer:

1: Eject Them

2: Power-Saving Modes

3: Regularly

4: May Damage

5: Internals and Externals Components

6: You and the Computer

Explanation:

1. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to Eject Them

2. Sleep mode and Hibernate mode are Power-Saving Modes that help you safely put your computer in a low-power state when you will not be using it for a period of time.

3. Cleaning dust from your keyboard, monitor, and fans should be done Regularly.

4. Magents May Damage a computer’s performance.

5. Heat, humidity, and cold can damage a computer’s Internals and Externals Components.

6. You should check all computer cords for the safety of You and the Computer.

What is the legal precedence that affects data collection and data preservation as it relates to the digital forensics process

Answers

Answer:

Following are the solution to this question:

Explanation:

Some certain laws affect collection and data preservation procedures. When an electronic crime happens, government employees must be ordered to continue with both the inquiry or permission by their senior government officials. The digital forensic investigator has to comply with the laws of a country as they apply to both the situation so if conducting out such a digital forensic analysis. Many law safeguards that rights of patients who could obstruct their investigator. Its culprit can manipulate or interfere with digital evidence until the inquirer gathers and maintains this. There are many limitations on permit study. 

When its private data is revealed, the Electronic Communications Protection Act (ECPA) has been adopted to protect the privacy rights of its ISPs' consumers. That protects people (suspect/culture) from the investigators by just not acquiring its ISP's information, in many specific regulations are affecting the process of digital forensic data collection and preservation.

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!

Find sum of the first n even numbers.
Without using formula (n*(n+1)).

Answers

Answer:

number = int(input())

x = 0

y = 0

for n in range(number):

if n % 2 == 0:

x += n

else:

y += n

print(x)

print(y)

why is it important to make sure link is from a trusted source?

Answers

Answer:

So to make sure itś true not false

Explanation:

Answer:

so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff

Explanation:

hope this help !!:):

why we have to maintain the good condition of tools and equipment?​

Answers

Answer:

Construction tools and equipment suffer a lot of wear and tear. Hence, it is important to maintain them regularly. This will help increase the service life as well as the performance of the equipment. Precautionary maintenance of tools and equipment will also help reduce unwanted expenses related to broken or faulty equipment

Explanation:

HELP ME PLEASE PLEASE PLEASE!!!! IM BEGING YOU!!!!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed

Explanation:

please an urgent answer
will give brainliest
what is the definition of bucket address.​

Answers

Is this technology? Let me know so I can help you!!

What actions can you take to ensure the physical security of network devices?

Answers

use vpns, use long hard to figure out passwords, and keep ur devices in sight or reach of you

Answer:

Here are some steps you can take to make sure your network is secure:

Take physical precautions. ...

Make sure all of your server's security features are enabled. ...

Use both hardware and software firewalls. ...

Install the latest version of your server's software. ...

Guard passwords. ...

Be Wi-Fi savvy.

Explanation:

PLEASE MARK ME AS BRAINLIEST

Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.

PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}

PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?

math(1, 2)

Answers

Answer:

The display will be 17.

Explanation:

Tracing through the program:

At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.

If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.

So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.

So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.

Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.

Then c (7) and g (10) are added together and displayed.

How do we store value in a variable? Give an example

How do we use the value in variable? Give an example

Answers

Answer:

hi

Explanation:

im not smart

Corrine is doing online research about polar bears. One Web site she finds is wwwdefendersorg. What is the likely primary goal of this Web site?
A. to persuade or change the thinking or actions of others

B. to sell a product

C. to provide clear, balanced, and unbiased information about the topic

D. to entertain the viewer

Answers

Answer:

C

Explanation:

This should be right

cccccccccccccccccccc Explanation:

What is the importance of different camera angles ?

Answers

Answer:

the camera angle helps the Creator to establish different relationships between the subject and even between the audience and the subjects. it's very important to master these techniques if you want to become a pro filmmaker!

Different camera angles can capture
a different point of view. This means that with a different angle and the same subject you can get different pictures that evoke different feelings.

PLEASE HELP ASAP!! Timed test!!
Lakendra finished working on her monthly report. In looking it over, she saw that it had large blocks of white space. What steps could Lakendra
take to reduce the amount of white space? It’s more than one answer!!
A. Include more special effects
B. Have an unjustified right margin
C. Increase the use of boxes and rules
D. Adjust column spacing

Answers

Answer:

d i think

Explanation:

If you could design an app for a phone or tablet, what would it be? Explain your design in at least a paragraph.

Answers

Answer:

If i were to design an app for a phone or a tablet, it would probably be about cloth styles...

Explanation:

Sowwy but I don't have time to write a paragraph.. tho search information about this and see what you find.. hope I helped :)

Answer:

I would design  an app for hospital patients to communicate on.

Explanation:

Due to the pandemic, people admitted to the hospital for long term diseases are currently stuck in their rooms not being able to communicate with other patients on their floors. This app can fix that and help people make new friends.

WILL GIVE BRAINLIEST IF IT IS RIGHT!! 25 POINTS!!!
Dacey needs to calculate the difference between 8,794 and 5,632.
Which Python statement should Dacey use to calculate this?
A.) print(8,794 - 5,632)
B.) print(8,794 * 5,632)
C.) print = 8,794 + 5,632
D.) print("8,794 - 5,632")
(this is for Coding)

Answers

Answer:

A

Explanation:

When you are finding the difference in a code you are subtracting the bigger number from the smaller one. You wouldn't technically use " " when printing a number equation as it doesn't work.

Answer:

The answer is A

Explanation:

they are not multiplying so its not b

they are not adding so its not c

there is NOT quotation marks when calculating.

The binary number represented by the voltage graph below is

I will give you brainlist if you actually answer

Answers

Answer:

the answer is the pattern is odd numbers like Odd numbers are whole numbers that cannot be divided exactly into pairs. Odd numbers, when divided by 2, leave a remainder of 1. 1, 3, 5, 7, 9, 11, 13, 15 are sequential odd numbers. Odd numbers have the digits 1, 3, 5, 7 or 9 in their ones place.

Explanation:

Answer:

11010100

Explanation:

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

con Arrange the following steps in conducting preventive maintenance of compentylook
by wing the number in the blank provided
Secure a borrowers slp from your teacher
Perlombricating procedure
out the splom conectly intended for the needed to
Read and analyze the use of preventive Maintenance Schedule form
Apply thin coat of oil on the parts for a long period of time
Open the bearing cover and opply rose
Determine the types of tools and machines needed to be caled
Determine the parts of the machine needed to be lubricated
ou requisition splor in releasing the lubricants needed
Perform the task according to the prescribed schedule and the signed machine​

Answers

Dhdhdirhhdieneyneynsys subsided dumdudnydb dundudnydb udndundyb. Dundundybd dundundyou did not have urge

There are differet kinds of tools in the box identify the tools that we leed in embroidery.Write your answer in the blank

Answers

Answer:

The tools are listed below.

Explanation:

There are many tools used in embroidery, the basic ones are mentioned below:

- Needles: there are needles like crewel needle, Milliner needle, tapestry needle.

- Hoops and frames

- Embroidery Scissors

- Pinking shears

The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an external application (non-HTML) isolates text that is formatted in a different direction from other text o creates multiple media resources for < video > elements​

Answers

Answer:

yes very correctExplanation:

Other Questions
Gwendolyn placed a 10-foot ladder against the side of her house so that the base of the ladder was 3 feet from the base of the house, as shown in the diagram below. Which measurement in feet is closest to d, the distance from the top of the ladder to the ground? 5k - 9 - 2k + 3 = 3k - 6 Here are the ingredients needed to make 8 pancakes250ml milk140 g flour5 g buttera) Simon makes 4 pancakes. Describe the colonists soldiers A clothing store is having a sale in which everything is 10% off. A shirts original price is $27. A customer uses a coupon for $5 off after the sale price. How much did the customer save? When compared to prokaryotic cells, eukaryotic cells4A. are simple, smaller, and have DNA floating freely throughout the cell.B. are complicated, larger, and have DNA captured in a membrane-bound structure.C. are round and hard, unlike rectangular and soft prokaryotic cells.D.are able to move from place to place, unlike stationary prokaryotic cells. Another teacher decides to average the height of all 15-year-old male students in his classes throughout the day. By the end of the day, he measured the height of 57 boys and calculated an average of 68.1 inches. The known mean height for 15-year-old boys is 67 inches, with a standard deviation of 3.19 inches. What is the percentile rank for this sample? (enter a number only, rounded to the nearest 2 decimal places) What is the missing length?y6 inarea = 18 in?yinches Put these fractions in order from greatest to least.8/9 8/11 8/10 8/12 NEED HELPPart AIn the following passage from Life on the Mississippi, what is the most important reason the young Twain wants these two jobs on a steamboat?I first wanted to be a cabin boy, so that I could come out with a white apron on and shake a tablecloth over the side, where all my old comrades could see me; later I thought I would rather be the deckhand who stood on the end of the stage plank with the coil of rope in his hand, because he was particularly conspicuous. A. He feels that they are the easiest jobs of all. B. He knows that they are open to young boys. C. He thinks that they are visible to people on shore. D. He does not really understand what such workers do.Part BWhich pair of phrases from the passage best supports the answer to Part A? A. shake a tablecloth over the side stood on the end of the stage plank B. my old comrades could see me he was particularly conspicuous C. come out with a white apron with the coil of rope in his hand D. come out with a white apron my old comrades could see me Jamal drew a picture.8 cm4 cmWhat is the area of the picture Jamal drew? Enter the answer in the box. Y=6-4(2). What is the value of y=6-4x when x=2 Which series of transformations will ALWAYS form an image that is congruent to its pre-image? Circle all that apply.A. Translation, Reflection, DilationB. Rotation, Dilation, RotationC. Reflection, Translation, DilationD. Reflection, Rotation, TranslationE. Reflection, Reflection, Reflection What is the atomic mass of this atom? 65 POINTS!!! ANSWER ASAP PLEASE! Computer keyboards have many different types of keys. A key may have a number, letter, or symbol (like a question mark) on it. On the keyboard shown, what percent of the keys do NOT have numbers on them? A. 40% B. 25% C. 75% D. 10% OLZZ HELPP ILL GIVE BRAINLIST Who started the tradition of having a "Cabinet?" 8w + 6 - 7 - 4w what is the answer PLEASE HELP ME I WILL GUVE BRAINLIEST I REALLY NEED HELP Can someone. Explain why its 14/50 will mark brainliest. Lara eats a bowl of granola for breakfast every morning. She wonders how much granola she eats in a year. If Lara eats about one 48-ounce bag of granola every month, how many pounds of granola does she eat each year?