1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
4 years ago
9

What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???

Computers and Technology
1 answer:
Masja [62]4 years ago
8 0

Answer:

The Kibibyte was developed to take place of the kilobytes in the computer science context where the Kilobyte stands for 1024 bytes. And the Kilobyte interpretation to mean 1024 bytes, conflicts the Standard definition of the prefix kilo or 1000. And the IEC convention for computer international memories was made to define the international standards for electrical, electronic and related technologies.

Explanation:

Please check the answer section.

You might be interested in
Find meanings for the words and give examples where you can<br><br> WORTH 30 points
NARA [144]
Vector: A one dimensional array. A 1 inch arrow pointing at a 30° angle.
Bitmap: Image file format. An image displayed on a computer monitor.
Image file types: JPEG, GIF, PDF.
Variables: A value that can change based on information in the program. null, int, char.
Program sequencing: Running code in order, from top to bottom.
Program integration: Combining parts of software into one system.
HTML: Programming language, short for Hypertext Markup Language. You can create paragraphs with HTML.
Good web design: A website that is easy to use, pleasing to look at, and suits the brand of the website accordingly.
3 0
3 years ago
Match the definition with the correct term: Closeness to the true value of a measurement
LenKa [72]
Closeness to the true value of a measurement is accuracy
7 0
4 years ago
Jason Diaz is a financial advisor who works in an open office with coworkers nearby. Jason advises clients both in person and ov
Elanso [62]

Answer:

There is a need for a microphone and a speaker in the form of a headset for privacy, also, the conventional keyboard and monitor screen. For information security, a configured firewall is recommended to prevent hacking.

Explanation:

Input and output devices are tools used by an operator of a computer device to give instructions and monitor results respectively.

Jason would need a headset, which has a speaker for hearing and a microphone for speaking to the client on a video conference call. These I/O devices are readily available on some personal computers. Every computer system has a keyboard and a monitor, this is also useful for Jason for communicating with his client.

7 0
3 years ago
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very
VashaNatasha [74]

Answer:

I believe it's B

Explanation:

...but is it?

3 0
3 years ago
Which type of operating system is usually used in personal computers?
jeyben [28]

Answer:

A GUI based operating system is usually used in personal computers

Explanation:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).

4 0
3 years ago
Other questions:
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • What does manual exposure mean
    9·2 answers
  • In one or more complete sentences, explain about vehicle maintenance and vehicle safety
    12·2 answers
  • Ill give you brainiest.
    9·1 answer
  • I love dog my is 16 weeks old how old is yours
    12·1 answer
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • Now you are ready to implement a spell checker by using or quadratic. Given a document, your program should output all of the co
    15·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • Which of the following internet protocols is used to request and send pages and files on the World Wide Web
    13·1 answer
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!