1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
7

How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe

nted in ASCII?
Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
6 0

<span>To capitalize lowercase “a” which is 0110001 which is “A” you will need to flip the following bites 01000001<span> as represented in ASCII. Since we are only looking at 2bit digit which is 0 and 1 which  has a 256 possible combinations from 0 up to 255. </span></span>


You might be interested in
PLEASE HELP ASAP!!
saw5 [17]

Answer:

d. Add a summary for each paragraph on the page.

Explanation:

When writing a paper you would want to explain what your writing about in the introduction.

7 0
4 years ago
Read 2 more answers
. What is the relationship between frequency, wavelength and speed of a wave?
jeka94

Answer:

vw = fλ

Explanation:

Sound, like all waves, travels at a certain speed and has the properties of frequency and wavelength. You can observe direct evidence of the speed of sound while watching a fireworks display. The flash of an explosion is seen well before its sound is heard, implying both that sound travels at a finite speed and that it is much slower than light. You can also directly sense the frequency of a sound. Perception of frequency is called pitch. The wavelength of sound is not directly sensed, but indirect evidence is found in the correlation of the size of musical instruments with their pitch. Small instruments, such as a piccolo, typically make high-pitch sounds, while large instruments, such as a tuba, typically make low-pitch sounds. High pitch means small wavelength, and the size of a musical instrument is directly related to the wavelengths of sound it produces. So a small instrument creates short-wavelength sounds. Similar arguments hold that a large instrument creates long-wavelength sounds.

The relationship of the speed of sound, its frequency, and wavelength is the same as for all waves: vw = fλ, where vw is the speed of sound, f is its frequency, and λ is its wavelength. The wavelength of a sound is the distance between adjacent identical parts of a wave—for example, between adjacent compressions as illustrated in Figure 2. The frequency is the same as that of the source and is the number of waves that pass a point per unit time.

5 0
3 years ago
Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
Mrrafil [7]

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

7 0
3 years ago
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
3 years ago
Read 2 more answers
Other questions:
  • For window 7 explain the steps you us to find the available program your software will list ?
    8·1 answer
  • Which is the output of the formula =AND(12&gt;6;6&gt;3;3&gt;9)
    6·1 answer
  • If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
    7·1 answer
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • PLZZZ HELP 30 POINTS!!
    14·1 answer
  • A parent is browsing through a shopping website, looking for blue-colored striped socks for her child. She is fine if the socks
    15·1 answer
  • Which programming language was released first
    7·1 answer
  • COMPUTER CODING
    5·1 answer
  • What does BGP use by default to calculate the best route?
    15·1 answer
  • Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!