1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
5

A byte is made up of 8 bits (binary digits). You have a programming language that uses one byte to represent characters and are

now modifying your language to use two bytes to represent characters. How many more characters can you represent in your new programming language?
Computers and Technology
1 answer:
fomenos3 years ago
8 0
You can only have 2 characters represented in your new programming language since a binary number is made up of 0 and 1, and each character is one byte. One character would be 1 and the other 0.
You might be interested in
What is the name of situation where the same data is stored unnecessarily at different places?
Delicious77 [7]

Answer:

Data redundancy.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

Data redundancy is the name of situation where the same data is stored unnecessarily at different places.

Simply stated, data redundancy can be defined as a condition which typically involves storing the same data in multiple storage locations. Thus, data redundancy connotes the unnecessary repetition of the same piece of data (informations) either deliberately or for some specific reasons.

3 0
3 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
4 years ago
What does it mean when something is the tip of this ice burg​
guapka [62]

The meaning of the phrase " the tip of the/this iceberg, refers to a small part of a very large or serious problem, so something at the tip of the iceberg is a smaller part of something big.

Hope this helps, if not, comment below please!!!!

7 0
3 years ago
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
The _____ command icon looks like a small clipboard with a page attached.
NISA [10]
The COPY command icon looks like a clipboard with a page attached.
3 0
3 years ago
Other questions:
  • The analysis of how people relate to each other is known as?
    6·1 answer
  • What are two great ways to find clues to locate commands on the ribbon?
    13·1 answer
  • Ross has to create a presentation for his class but can't decide on a topic. What should he do?
    9·2 answers
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
    13·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • Calculate how much disk space (in sectors, tracks, and surfaces) will be required to
    14·1 answer
  • Which things computer case contains
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!