Answer:
Don’t answer anything unless it’s someone who you know.
Explanation:
 
        
                    
             
        
        
        
This system requires giving different codes to all characters in 5 bits. Thus, option "A" is correct.
<h3>What is a bit for a computer?</h3>
A bit is a binary digit, the most smallish increment of data on a computer. A bit can have only one of two values: 0 or 1, compared to the electrical values of off or on, respectively. Because bits are so small, you rarely work with data one bit at a time.
Thus, option "A" is correct.
To learn more about  binary digits click here:
brainly.com/question/16942844
#SPJ1
 
        
             
        
        
        
According to the search engine algorithm, it is <u>True</u> that the majority intent is determined by how many times the same result is shown on the search engine result page.
<h3>What is Search Intent?</h3>
Search Intent is a term used to describe a user's reason when typing a question or words into a search engine. 
Generally, if a user found that no search results match his wants, he would likely not click on any link before performing a similar query search. This would make search engines return with more links that have higher clicks.
<h3>Different types of Search Intent</h3>
- Informational
- Commercial
- Navigation
- Transactional
Hence, in this case, it is concluded that the correct answer is True.
Learn more about Search Engine here: brainly.com/question/13709771
 
        
             
        
        
        
Answer: Enforce the organization's security policy 
Explanation: Group policy provides a robust and centralized control to systems or computers on a particular network by providing a quick and efficient means of maintaining network security by affording network administrators the ability to several policies they wish to apply on users and computers in their network. This way the changes or policies can be applied to every computer on it's network. Hence it allows the network administrators to enforce the organization's security policy which may include restricting access to certain websites, directories, files or settings for all computers on the organization's network.