Data normally enter a computer through an input device in __________ form.

a. binary
b. floating-point
c. bitmap
d. string


d. string

Computer Science & Information Technology

You might also like to view...

A(n) range is a series of cells.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What field within the PPP header enables multiple Layer 3 protocols to pass over the same link?

A) EtherType B) Control C) Flag D) Protocol type

Computer Science & Information Technology

The bootrec ______________ command rebuilds the boot sector for the active system partition.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is an example of social engineering?

A) Spamming B) Phishing C) Spyware D) Malware

Computer Science & Information Technology