1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
4 years ago
10

How many bytes are in a yottabyte. (don't look it up)

Computers and Technology
1 answer:
Elza [17]4 years ago
8 0
THe answer is 1e+23. I think
You might be interested in
The contents of a four-bit register are initially 1011. The register is shifted six times to the right, with the serial input be
balu736 [363]

Answer:

First shift - 1101

Second shift - 0110

Third shift - 1011

Fourth shift - 1101

Fifth shift - 0110

Sixth shift - 1011

Explanation:

Each time you shift a register to the right, you do 3 things:  

  • The rightmost digit drops off
  • You move the next three digits over one position to the right
  • You fill in the leftmost position with one of the numbers from your serial input.

Contents are initially 1011.  The 1 on the right disappears.  The leftmost 3 digits (101) end up in the last 3 positions of the register.  The first position of the register takes a number from the serial input, which is 1 in this case.  So you end up with 1101.

Do this a second time.  The rightmost 1 is gone, the 110 end up as the last 3 positions of the register, and you end up with 0 in the leftmost position.  This one is 0110.

The remaining 4 follow the same pattern.

4 1
3 years ago
Which instruction in this algorithm would be considered a loop structure? will mark u brainliest 25 points
Mazyrski [523]
I don’t know if I am right but I think it d am i right
6 0
3 years ago
Waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
True [87]

Answer:

AGGHHHHHHHHHHHHHHHHHHHGHGHHHHHH

Explanation:

8 0
3 years ago
Read 2 more answers
Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following
choli [55]

Answer:

The answer is letter B. Will fail without user commitment

Explanation:

With an old IT adage in mind, even a perfect IT program<em> Will fail without user commitment. Because the glaring vulnerability in the security architeture of ECM systems is that few protections exist once the information is legitimately accessed. These confidential information  often can be printed, e-mailed, or faxed to unauthorized parties without any security attached.</em>

4 0
4 years ago
What is a typeface?
zepelin [54]

ans . B a collection of similar fonts

8 0
3 years ago
Other questions:
  • The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
    10·2 answers
  • The type of manager that services all requests for data is known as?
    14·1 answer
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • What does the following code print out? (10 points) int[] array = { 1, 4, 3, 6, 8, 2, 5}; int what = array[0]; // scan the array
    14·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerica
    15·1 answer
  • WHY IS BRAINLY NOTIFICATIONS LIKE THIS?????
    15·2 answers
  • How can I get more views on my you tube channel "Braeden Eischen" without paying anything
    5·1 answer
  • ANSWER ASAP IF CORRECT I GIVE BRAINLIEST
    7·2 answers
  • What does a production proposal provide ?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!