1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
15

True / False Bit patterns have no intrinsic meaning.

Computers and Technology
1 answer:
scoray [572]3 years ago
7 0

Answer:

The given statement is True

Explanation:

Since, a bit pattern is a bit sequence, basically, data which as such has no intrinsic meaning.

Bit pattern is  a bit sequence or sequentially arranged binary digits.

It is used to describe bit sequence in communication channels, memory or some other device.

Bit patterns are used to represent instructions, floating point numbers,  signed/unsigned integers.

You might be interested in
Which of the four digital-to-analog conversion techniques (ASK, FSK, PSK or QAM) is the most susceptible to noise? Defend your a
grigory [225]

Answer:

ASK

Explanation:

The correct answer is ASK which denotes Amplitude Shift Keying. This is essentially a type of amplitude modulation which represents the binary data that comes varied forms right in the amplitude of a signal.

Now the reason why It is the most susceptible technique to noise is due to the fact that between frequency, phase & amplitude, amplitude is the one that is most susceptible to being affected by noise when compared to the other two.

3 0
3 years ago
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra
devlian [24]

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

4 0
3 years ago
You are being hired as the director of IT for a small firm that does retail trade business, and you will be the source of knowle
Orlov [11]

Director of IT role is major decision maker or any IT related issue such as network security, database, network issues etc. As policy to one to one end user and it department, which should cover as follows.

1. End-user is not allowed to share files or media files to any user through email or social media.

2. Login password should not be changed without IT approval of pc or   workstation or laptop.  Once changes password should be shared to IT department.

3. Sharing password Wi-Fi or access point to outsiders to be avoided.

4. Connecting usb drive or flash drive to workstation or laptop,

5. Own laptop or smartphone should not be connected to office network.

6. If workstation or desktop or laptop is effected with virus immediately to be reported to IT department.

5 0
3 years ago
A search engine company needs to do a significant amount of computation every time it recompiles its index. For this task, the c
romanna [79]

Answer:

See attached pictures for detailed answer.

Explanation:

See attached pictures for explanation.

5 0
3 years ago
Which options can you choose to determine the width and height of data or cells in a spreadsheet? You can choose the or rulers t
Tju [1.3M]

Answer :

Double click on boarder width an height will automatically adjust.

Manual procedure are following:

1.Open desire file of spreadsheet

2. Click on home tab in cell group and then click format.

3. Under cell size click on default width.

4. In standered column width box type new measurements and then click OK.

4 0
3 years ago
Other questions:
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    7·1 answer
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
    14·1 answer
  • Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and upda
    11·1 answer
  • How are Action Buttons different than hyperlinks?
    8·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
    10·1 answer
  • WHAT IS MULTIMEDIA SUPPOSED TO MEAN ???
    15·2 answers
  • PLS HELP ASAP!! which of these would be easier to do in a database program than a spreadsheet program? check all of the boxes th
    5·2 answers
  • Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!