What is machine level language ?​

Answers

Answer 1

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.


Related Questions

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

Other Questions
jose bought "n" packs of pencils. Each pack has 12 pencils. Write an equation to represent the total number of pencils "p" that jos bought. Which fraction equals the ratio of rise to run between the points (0, 0) and (6, 7)? A. B. C. D. Task 1: An advertising technique that uses a new kind of technology to communicate itsmessageType your reponse here:Task 2:An advertising technique that is most effective at the point of sale (i.e. at the moment thecustomer purchases the product)Type your reponse here:Task 3:A real-world case study of a company that was legally penalized for making false advertisingclaimsType your reponse here: The number of organisms that an area of land can sustain over a long period time is known as Study the map, then answer the questions below.The city of Mazatlan is located along the____________ The city of Ciudad Juarez is located____________One of the countries that share Mexico's southern border is __________ A. Pacific Ocean, along the US borders, BelizeB. Gulf of Mexico, along the Gulf of Mexico, MatamorosC. Caribbean Sea, along the Pacific Ocean,Honduras During a sale, a store offered a 20% discount on a stereo system that originally sold for $320. After the sale, the discounted price of the stereo system was marked up by 20%. A. weeks B. laughs C. days D. stops Can someone help me please really need help? Ill help you back please & thanks what is the difference between coding with html and coding with python Line A passes through the points (10,6) qnd (2,15). Line B passes through the points (5,9) and (14,-1). Tasha is planning an expansion of a square flower garden in a city park. If both the length and the width of the original garden are each increased by *3m*, the new total area of the garden will be *49* squared meters. Find the length of each side of the original garden. Write the algorithm for finding the perimeter of a rectangle using English like form step by step Question 24 Multiple Choice Worth 1 points)(8.01 MC)Two lines, A and B, are represented by equations given below:Line A: y = x - 4Line B: y = 3x + 4Which of the following shows the solution to the system of equations and explains why?0 (-3,-5), because the point satisfies one of the equations0 (-3,-5), because the point lies between the two axes(-4,-8), because the point satisfies both equations(-4, -8), because the point does not lie on any axis Neutral theory proposes thatA) molecular clocks are more reliable when the surrounding pH is close to 7.0.B) most mutations of highly conserved DNA sequences should have no functional effect.C) DNA is less susceptible to mutation when it codes for amino acid sequences whose side groups (or R groups) have a neutral pH.D) DNA is less susceptible to mutation when it codes for amino acid sequences whose side groups (or R groups) have a neutral electrical charge.E) a significant proportion of mutations are not acted upon by natural selection. What is the first thing a forensic scientist should do when they see this evidence?A. Make a plaster mold of it.B. Scrape soil samples from it.C. Take a photograph of it.D. Draw a sketch of it. Water scarcity is caused by exploitation and the contamination of water sources. Do you agree with this statement? Explain your answer. What is the Full form of DC? Find the surface area and the volume of the figure Round to the nearest tenth if needed. The values used in the scale of pH and pOH are derived from a system designed by ______.CurieGordonsenDaltonSorenson How many milliliters of a 0.40%(w/v) solution of nalorphine must be injected to obtain a dose of 1.5 mg?