1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
5

One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I

nformation​ Interchange). The uppercase letters A through Z are assigned the numbers 65 through​ 90, so A has binary code 1000001 and Z has code 1011010. Lowercase letters a through z have codes 97 through 122​ (that is, 1100001 through​ 1111010). ASCII​ codes, as well as other numerical computer​ output, normally appear without commas. Write the binary code for the letter k.
Computers and Technology
1 answer:
poizon [28]3 years ago
8 0

Answer:

01101011

Explanation:

k = ascii code 107, which is 0x6b in hex and 0110 1011 in binary.

You might be interested in
Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tigh
cricket20 [7]
Camera and wagon are answer
4 0
3 years ago
When scanning the road, glance away from the road ahead for ___. A. At least one second B. No more than one second C. At least t
Marrrta [24]
A.At least one second
5 0
3 years ago
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
4 years ago
Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
Dmitriy789 [7]

Answer:

The solution code is written in Python 3

  1. count = 0
  2. sum = 0
  3. num = input("Enter a number: ")
  4. while(num != ''):
  5.    sum += float(num)
  6.    count += 1
  7.    num = input("Enter a number: ")
  8. print("Sum : " + str(sum))
  9. print("Average: " + str(sum / count))

Explanation:

Firstly, we declare two variables count and sum to hold the number of input number and the total of the input number, respectively (Line 1-2)

Next, we prompt user to input the first number (Line 4). While the num is not ' ' (This means it is not "Enter" key), accumulate the num to sum variable and increment count by one (Line 6-8) and then prompt the user to input the next number (Line 9).

At the end, display the sum and average using print function (Line 11 -12).

5 0
3 years ago
CREIDT INAOCT Unscramble thr word<br>please solve it fast its urgent ​
ivanzaharov [21]

Answer:

Credit Action .......I believe

6 0
3 years ago
Other questions:
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • Two functions of the UPS​
    8·2 answers
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Why might a variable used for output have to be of a different type then a variable used for input?​
    15·1 answer
  • Write out a shorthand version of the border property which will apply border that is 5 px wide, colored in lightgreen, and solid
    9·1 answer
  • Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
    8·1 answer
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that
    7·1 answer
  • What are basic types of touch screen
    15·2 answers
  • How to give a file name as an argument in function in python.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!