1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
9

What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???

Computers and Technology
1 answer:
Masja [62]3 years ago
8 0

Answer:

The Kibibyte was developed to take place of the kilobytes in the computer science context where the Kilobyte stands for 1024 bytes. And the Kilobyte interpretation to mean 1024 bytes, conflicts the Standard definition of the prefix kilo or 1000. And the IEC convention for computer international memories was made to define the international standards for electrical, electronic and related technologies.

Explanation:

Please check the answer section.

You might be interested in
What should a valid website have?
zzz [600]
The answer is A.....
4 0
2 years ago
Major innovation made from establishment of abacus to the development of fifth dev of computer generation
expeople1 [14]

<u>Explanation</u>:

The establishment of the Abacus brought about one of the first counting device (calculator). This device was a mechanized computer that supported numeric calculations. However<u>, the process was entirely manual and mechanized. </u>This innovation led to;

First-generation  of computers, although not entirely manually operated like Abacus, made use of vacuum tubes, were very big in size and could store only a small amount of information.

Second Generation of computers unlike the first generation that uses vacuum tubes, this one came with new technology; the use of transistors. The computers were smaller in size than vacuum tubes.

Third Generation  computers made use of IC (Integrated circuits) for the first time. Contained higher storage capacity and was more reliable than previous generations.

Fourth Generation computers became known as the personal computer generation. This generation brought the use of personal computers on a personal level as they use microprocessors, was easy to carry about, had larger storage capacity and faster speed of operations.

Fifth-generation of computers is known as the age of artificial intelligence. These computers were programmed with the ability to make decisions just like a human being would.

7 0
3 years ago
The gradual wearing away or breaking down of rocks by abrasion is a type of __________________ weathering.
lesya [120]

Answer:

a.physical

Explanation:

3 0
2 years ago
Depending on your web browser, you may be able to locate a folder or a file on your machine that contains cookies. Look through
gogolik [260]

Answer:

yourmom.com    yourhaouse.com   and     mcdonalds.org

Explanation:

7 0
2 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
2 years ago
Other questions:
  • A security policy is a
    11·1 answer
  • Which is usually the smallest computer?
    15·1 answer
  • Analyze the following code. // Program 1: public class Test { public static void main(String[] args) { Object a1 = new A(); Obje
    5·1 answer
  • 50 points!!!!!
    9·2 answers
  • What can a person do to help increase their credit score?
    12·1 answer
  • Finish the statement below to correctly describe the Defense Enrollment Eligibility Reporting System (DEERS). DEERS is a central
    6·1 answer
  • Write a program that receives an character and displays its Unicode. Here is a sample run: Enter an character: E The Unicode for
    8·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • Which fund classification would a focus on only stocks of technology companies match?
    10·1 answer
  • To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!