1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
4 years ago
9

Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c

ode for the blank (space) is 32 and ASCII code for 0 is 48.
O True O False
Computers and Technology
1 answer:
Anni [7]4 years ago
8 0
True! And also quick fact there’s another thing that has thousands of codes for different languages as well. Also emojis are represented as codes
You might be interested in
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer.
DochEvi [55]

We have that the appropriate statement will be

  • An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

III only.

Option B

From the question we are told

Consider the following <u>algorithms</u>. Each <u>algorithm</u> operates on a list containing n <em>elements</em>, where n is a very large <u>integer</u>.

I. An algorithm that accesses each <u>element</u> in the list twice.

II. An <em>algorithm </em>that accesses each <u>element </u>in the list n times.

III. An <u>algorithm</u> that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the <em>algorithms </em>run in <em>reasonable </em>time?

<h3>Algorithm  </h3>

Generally In order to get <em>admission </em>to every thing in the list twice, the algorithm has to traverse the listing twice,

which leads to 2*n entry to operations.

And if the every factor is accessed n times, the listing will be traversed n time, which leads to n^2 get right of entry to operations.

If n is a very giant <em>integer</em>, each 2*n and n^2 are plenty larger.

So, there will be <em>solely </em>ten entry to operations and this algorithm will have a sensible jogging time.

Therefore

An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

III only.

Option B

For more information on  algorithm  visit

brainly.com/question/950632

4 0
2 years ago
Read the underlined sentence on page 1.
olasank [31]

Answer:

It for shadows the reason that peles temper is not just a rumor wich is proven in the answer she gives

Explanation:

it says that you should forget the rumors and her fiery temper whic means ti is true

6 0
3 years ago
Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
AVprozaik [17]
<span>Charts are inserted into an excel spreadsheet using the commands in the charts group on the Insert tab on the ribbon.
There, on the Insert tab, you will find many options when it comes to the things that you want to insert into your Excel spreadsheet, such as images, tables, and charts, among other things.</span>
7 0
3 years ago
Deanna is a high school student she been feeling overwhelmed recently because there seems to be so many things to do she decided
lukranit [14]
Cool she seem like she is very smart
6 0
4 years ago
Other questions:
  • Tommy has hired a marketing company to create a billboard advertisement
    11·2 answers
  • Which code fragment constructs an arrray list named players that is initialized to contain the strings "player 1" and "player 2"
    15·1 answer
  • Dynamic disk storage provides the flexibility to logically organize disk space across one or more disk drives.
    15·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • Which computer company was named after an orchard? dell, apple, or ibm
    11·1 answer
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • Cine stie repede va rog mult si repede
    9·1 answer
  • What is the purpose of a hyperlink in a presentation?
    11·1 answer
  • 2+2? D: I don't knoww​
    12·1 answer
  • Check all that apply to Raster Graphics
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!