1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
13

How many bits must be "flipped" (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase that’s represented

in ASCII?
Computers and Technology
2 answers:
Alexxandr [17]3 years ago
8 0
Only one ... the third bit of the byte, numerical 32.  Every lower-case letter 
has a '1' in that place.  If that bit is changed to '0', then the code represents
the upper-case form of the same letter.
Sever21 [200]3 years ago
6 0
1 bit must be flipped because:

A=01000001
a=01100001

So to go from a to A you have to change the 3rd bit from 1 to a 0.
You might be interested in
____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man
Rainbow [258]

Answer:i think is an intranet

Explanation:because that's where they save most of their things

7 0
3 years ago
Read 2 more answers
1 punto
sergey [27]

Answer:

c Proceso productivo

Explanation:

3 0
3 years ago
What is the computer?​
DiKsa [7]

Answer:

an electronic machine that can store, find and

8 0
2 years ago
Assume the user types in 7 for x and 2 for y. What is output by the
vladimir1956 [14]

Answer:

49

Explanation:

3 0
3 years ago
Creating calendar events prevents individuals from being able to schedule a time to collaborate.
Yuliya22 [10]

Answer:

False because calender events help a person remeber when s/he has a event happening that day!

6 0
3 years ago
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • A URL suffix is called a domain name.
    11·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • What will the value of x be after the following statements execute? int x = 0; int y = 5; int z = 4; x = y z * 2;
    14·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • 1. How many questions are on the Consensus Assessment Initiative document?
    10·1 answer
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • With SQL, how do you select all the columns from a table named "Persons"?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!