1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
13

How many bits must be "flipped" (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase that’s represented

in ASCII?
Computers and Technology
2 answers:
Alexxandr [17]3 years ago
8 0
Only one ... the third bit of the byte, numerical 32.  Every lower-case letter 
has a '1' in that place.  If that bit is changed to '0', then the code represents
the upper-case form of the same letter.
Sever21 [200]3 years ago
6 0
1 bit must be flipped because:

A=01000001
a=01100001

So to go from a to A you have to change the 3rd bit from 1 to a 0.
You might be interested in
What are some options available when you click File and then Print? (Multiple Choice)
WITCHER [35]

Answer:

Changing Margins

Selecting the Printer

Viewing a preview

Selecting the pages to print

Changing the page orientation

Explanation:

3 0
3 years ago
What are 3 things that can make cyberbullying especially harmful​
motikmotik

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

3 0
3 years ago
Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
xz_007 [3.2K]

The security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network is WEP. The correct option is A.

<h3>What is WEP?</h3>

Wired Equivalent Privacy (WEP) is a security protocol defined by the IEEE 802.11b Wireless Fidelity (Wi-Fi) standard.

That standard is intended to provide a wireless local area network (WLAN) with security and privacy comparable to that of a wired LAN.

WEP is a wireless network security protocol that attempts to provide the same level of security as a wired network.

Thus, the correct option is A.

For more details regarding WEP, visit:

brainly.com/question/13775698

#SPJ4

Your question seems incomplete, the missing options are:

A. WEP

B. WEB

C. WELL

D. WALL

7 0
2 years ago
More registers appear to be a good thing, in terms of reducing the total number of memory accesses a program might require
Elina [12.6K]

Answer:

Registers are meant for performing various operations, and Memory Data Registers, address registers, index registers, data registers, Program counters, and accumulators all work in tandem to solve various purposes. And if we have more registers then we are certainly going to reduce the total number of memory accesses that a program might need.

Explanation:

Registers, as explained above, can certainly reduce the number of memory accesses that a program might need as the MDR number will increase, and so other types. Hence, in a reduced number of memory addresses, we will be able to run a program.

5 0
4 years ago
Identify a characteristic of in-house hosting
zalisa [80]
<span>An identifying characteristic of in-house hosting is the ability to have total control of a data location. In-house hosting simply means that instead of relying on an outside or outsourced company to host your website, you do it yourself within your own company with your own employees.</span>
3 0
3 years ago
Other questions:
  • If you know the unit prices of two different brands of an item you are better able to
    8·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • Suppose a MATV/SMATV (Satellite Master Antenna Television) firm has to start it's operation in the metropolitan area of a countr
    12·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • Text box linking is for two or more text boxes in a document, when the text overflows from the first box. Which scenario is the
    9·2 answers
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • Please Help! <br> I need good Anime to watch!
    7·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!