1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
4 years ago
8

How many Megabytes are there in a Gigabyte?

Computers and Technology
1 answer:
Tju [1.3M]4 years ago
7 0
<span>
In quantities of data,
"kilo" = 2^10 = 1,024
"mega" = 2^20 = 1,048,576,
"giga" = 2^30 = 1,073,741,824 .

<span> <span /></span></span> <span>1 gig = 1,024 megs<span><span /></span></span>


You might be interested in
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
BARSIC [14]
Lua

for i =12,86,2 do

print (i)
end
5 0
4 years ago
Utility software is used to maintain a computer.(yes or no)​
uranmaximum [27]
Yes a computer system is to help maintain a computer
4 0
2 years ago
Read 2 more answers
Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
valentina_108 [34]
A) CREATE TABLE toplevelcust (number INTEGER PRIMARY KEY, <span> name TEXT, address TEXT, balance DOUBLE, credit DOUBLE</span>);

b) select number, name, credit - balance from toplevelcust

c) This I cannot answer
7 0
4 years ago
Read 2 more answers
1. Define Validation Rule
RoseWind [281]

Answer:

1. A Validation Rule is a rule given to a field that ensures that the attribute of data entered into the field meets the set criteria of the field before the data can be saved. The question asked by the field is either 'Yes' True or 'No' False, with the required answer being Yes or "True"

2. Compressed hours

Compressed hours is work mode where employees are allowed to do the number of hours to which they are contracted over a less number of working days

3. Microsoft Access

Microsoft Access is designed to automatically save data entered into forms as the user moves between records or when the form being worked on is closed thereby, ensuring  that data loss is prevented even when the form is closed after an edit is made

4. A document editor

A document editor can be used for the creation of new document and editing existing documents of different file types

Explanation:

5 0
3 years ago
Other questions:
  • What is used to determine when the communications channels are clear and when a device is free to transmit data
    6·1 answer
  • Does the Main Content (MC) of a web page include searchboxes?
    10·1 answer
  • Many loop control variable values are altered by ____ or adding to them
    11·1 answer
  • Format character of Date function that display the day of the month in 2 digits with leading zeros such as 01 to 31
    11·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • In client server network, there is no central server //// true or false​
    8·1 answer
  • Which MLA web source citations are formatted correctly? Check all that apply.
    6·2 answers
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!