1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
7

How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe

nted in ASCII?
Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
6 0

<span>To capitalize lowercase “a” which is 0110001 which is “A” you will need to flip the following bites 01000001<span> as represented in ASCII. Since we are only looking at 2bit digit which is 0 and 1 which  has a 256 possible combinations from 0 up to 255. </span></span>


You might be interested in
Why does it say error on that last line of code
wel

Answer:

i have no clue

Explanation:

8 0
3 years ago
Read 2 more answers
APPLY
tatiyna

Answer:

i<6 is the "end guard". This means that the loop continues while this is true, and ends when this is false.

i++ is the "continuation", it is the operation executed when the loop continues. i++ increases the value of i by one.

4 0
3 years ago
How did music in the Renaissance differ from medieval music?
Damm [24]
Medieval music was in the time<span>of the middle ages. Renaissance music is the time for art and culture.
</span>
Medieval music refers to music written during the Middle Ages, around the time of 500AD - 1400. Little written music of this period survives, as making scores of music proved expensive, but most music of this time was monothonic or homorhythmic plainchant. Music from this period was generally modal and the begginings of counterpoint were seen in the form of organum. Renaissance music refers to the period from around 1400-1600, although there is some discrepancy in defining the begining of this period. Counterpoint became much more elaborate and it was over the duration of this period that composers began to leave the old modal music system in favour of tonality. Notable composers of this period <span>are Orlando Gibbons, John Bull, Thomas Tallis and William Byrd. </span>
7 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
What citation style should I use if applying for a government job?
maw [93]
You should always cite your sources with a referral to the person.
3 0
3 years ago
Other questions:
  • Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
    7·1 answer
  • The house had a wonderful pool of ... (his/its/our) own.​
    5·1 answer
  • Compute the sum of all integers that are multiples of 9, from 1 to 250. Enter your result of your computation in the text box be
    9·2 answers
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • Discussion Six: Code of Ethics IT workers have many different relationships, including those with employers, clients, suppliers,
    7·1 answer
  • You're the sole IT employee at your company, and you don't know how many users or computers are in your organization. Uh oh! Wha
    8·1 answer
  • Friday Night Funkin Fans, does this count as a leak if I share it?
    13·2 answers
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • Java !!!
    10·1 answer
  • What is my mistake on this code? (Python)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!