1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
4 years ago
11

Explain why the 7 bit standard ASCII code needs to have the highest bit set to a zero

Computers and Technology
1 answer:
Oduvanchick [21]4 years ago
4 0
ASCII (as opposed to <span>ISO 8859) only uses 7 bits per character, and one byte per character. Byte numbers with the highest be set to 1 would have value 128-255, which is undefined by ASCII.

Some (old) serial communication protocols use only 7 bits per character. In such a protocol you wouldn't even be able to send the 8th bit because it isn't there.

It is always good to remember that in general a char is not a byte. Only in ISO 8859 this is the case. But in UTF-8 for instance, a char is 1, 2, 3 or 4 bytes.</span>
You might be interested in
You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What lang
nignag [31]

The code below is written in JavaScript and does not seem malicious.

<h3>What is a Malicious Code?</h3>

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

  • harming the workstation; or
  • destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
brainly.com/question/16698901

8 0
3 years ago
Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________
KIM [24]

Answer:

Script Kiddies or "Skiddies"

Explanation:

A script kiddie, or “Skiddie,” is someone who lacks programming knowledge and uses existing software to launch an attack. Often a script kiddie will use these programs without even knowing how they work or what they do. They begin playing with the various programs while searching for online tutorials. At first, they may be perceived as nothing more than an internet troll or noob, due to their lack of experience and quickness to brag and boast. Sometimes they will even resort to cyber stalking or bullying. However , this may simply be a cover for other more nefarious activity.

3 0
4 years ago
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
4 years ago
Which step do you think is most useful from big data life cycle.why?
12345 [234]

Explanation:

Business xase evaluation is most useful because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements.

Mark me brainliest

7 0
2 years ago
Whats the size of a short bond paper in microsoft word?
poizon [28]
I believe the size is 8.5x11
7 0
3 years ago
Other questions:
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    5·1 answer
  • Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is
    9·2 answers
  • Your ASP.NET page contains a page-level variable of Customer type. You want to preserve the value of this variable across page p
    11·1 answer
  • What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
    11·1 answer
  • You can use______ in order to allow the user to browse and find a file at run time.
    15·1 answer
  • Missing slot covers on a computer can cause?
    9·1 answer
  • Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to
    12·1 answer
  • Which similar computer network components connect multiple devices?
    7·1 answer
  • Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?
    12·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!