1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
14

How many bits are required to store the text of the number 150 in ascii?

Computers and Technology
2 answers:
kaheart [24]3 years ago
7 0
The correct answer of the given question above would be 24 BITS. The number of bits that are required to store the text of the number 150 in ASCII would be 24 bits. ASCII means American Standard <span>Code for Information Interchange. Hope this answer helps. </span>
aliya0001 [1]3 years ago
6 0

The answer is 24 bits

ASCII has encoding for numbers and every character of the alphabet. For instance, if you take 150 as an integer, you will need to store it as 8 bits. If it is taken as 3 characters, then it will require 24 total bits (8 * 3), that is 8 bits per character. It is good to note that the 8-bit byte is the most common storage element and enjoys 256 characters from the original 7-bit which has become a bit synonymous.

You might be interested in
Icon view, list view, and details view are all common views provided by which kind of program?
cupoosta [38]

Answer: The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Explanation:

boom : )

4 0
3 years ago
Read 2 more answers
Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
maw [93]

Answer:

Explanation below

Explanation:

Network organisations are those that is of a legal entity or independent company or a subsidiary business unit. These organisations can be an internal business unit acting as separate profit centres or a stable company that has outsourced its work.

Synthesis:

According to the articles "The top 3 network management challenges" and also "Problem Management in the Networking Environment" is that managerial issues like the problem diagnosis method itself can engage various stakeholders whose deeds need to be coordinated as well as tracked to confirm that the cost of study itself does turn into an issue along with that resolutions to problems are really discovered. An association expects its network to be  reliable, secure, flexible, expandable and cost-effective.

Relation:

Network security has had to adapt increasingly quickly, in order to keep up with the new ways that users and back-end systems work. Networks are growing not just in complexity, but also in size. As more and more functions converge onto data networks, the number of devices attached to the network grows, and therefore the number of switching and routing nodes in the network must also grow.Organizations need to attach more and more of their operations onto the data network – remote locations need connections into central sites; even locations with no staff need network links for surveillance cameras and/or environmental monitoring, and/or control of automated devices. An effective problem management is needed to handle the issues.

An effective problem management requires the integration of a number of different process groups and the ability to effect change in both the infrastructure and organizational behavior. Implementing a problem management strategy that achieves these goals needs careful planning and long-term commitment. Using external supplier relationships to make sure that the support required for both identifying problems and supporting the resolution is in place is also an integral part of the overall solution.

References: http://www.analytictech.com/mb021/virtual.htm

https://www.accyotta.com/assets/uploads/docs/Allied_-_AMF.pdf

7 0
3 years ago
Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
Sedbober [7]

Answer:

have a nice day! ❤❤

Explanation:

5 0
3 years ago
Modify the Comments.java program from Programming Exercise 1-10 so at least one of the statements about comments is displayed in
Zielflug [23.3K]
This isn’t even a question it’s just instructions for a question. can you elaborate???
4 0
2 years ago
If given the chance to own manage a business,what will be the name of the business?
Nady [450]
This is honestly an answer you can give. What would you name a business if you made one?
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • What is daemontools pakage in qmail?
    14·1 answer
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • "What is the database in which Windows stores all information about hardware, applications, users and system settings?"
    8·1 answer
  • If you want to present slides to fellow students your coworkers which productivity software should you use to create them
    15·2 answers
  • By the 1990s, ______________ technology enabled one person operating a desktop computer to control most—or even all—of these fun
    8·2 answers
  • What does IDLE stand for
    11·2 answers
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!