1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
5

A byte is made up of 8 bits (binary digits). You have a programming language that uses one byte to represent characters and are

now modifying your language to use two bytes to represent characters. How many more characters can you represent in your new programming language?
Computers and Technology
1 answer:
fomenos3 years ago
8 0
You can only have 2 characters represented in your new programming language since a binary number is made up of 0 and 1, and each character is one byte. One character would be 1 and the other 0.
You might be interested in
A company's computers monitor assembly lines and equipment using ________ communications.
mr_godi [17]

Answer:

Machine to machine communications

Explanation:

Machine to machine communication is a type of communication that exists among the technical devices. The communication is linked either with the help of wire or through wireless. The information is communicated and transmitted with this form of communication. Human involvement or intervention is not required during the transfer of data.

6 0
4 years ago
What is fruit nursery?​
Natasha2012 [34]
A place where young plants are produced through different ways is a nursery. The main work of nursery is to supply young plants and seeds for cultivation purposes for both fruits and vegetables. ... An appropriate environment for germination of seed. The nursery is also very useful for purpose of vegetation propagation.
7 0
3 years ago
Read 2 more answers
Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more a
NeX [460]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

8 0
4 years ago
Why should you log into your online or mobile app account with the travel charge card vendor?.
yuradex [85]

The reason why I  should  log into my online or mobile account with the travel charge card vendor is that it provides easy access to statements, payments, and mobile alerts.

<h3>What is Travel Charge Card?</h3>

Travel Charge Card  can be regarded as a card that provides travelers with a safe as well as available method to pay for expenses that goes with official travel.

This can be done by Filing a dispute with the GTCC vendor within 60 days.

Learn more about Travel Charge Card;

brainly.com/question/17639468

6 0
2 years ago
Which company was the first to develop personal computer?
Fudgin [204]

Answer:

Electronic Controls Company 

6 0
2 years ago
Other questions:
  • What are the only things that can be declared in an interface?
    11·1 answer
  • Give two reasons why cloud computing could be harmful to an organization.<br> (No choices!)
    15·1 answer
  • True or false a relational database is one in which every data item is related to every other data item
    6·1 answer
  • What does the following code print out? (10 points) int[] array = { 1, 4, 3, 6, 8, 2, 5}; int what = array[0]; // scan the array
    14·1 answer
  • Can folders have mixed apps?
    6·1 answer
  • Outline the things that Mccann needs to do right away
    13·1 answer
  • A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were se
    15·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
  • Write the code (from to )using for loop andif elseif statementto accept themobile phone numbersof200 residents of Dubaiasstringa
    15·1 answer
  • which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!