1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
5

One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I

nformation​ Interchange). The uppercase letters A through Z are assigned the numbers 65 through​ 90, so A has binary code 1000001 and Z has code 1011010. Lowercase letters a through z have codes 97 through 122​ (that is, 1100001 through​ 1111010). ASCII​ codes, as well as other numerical computer​ output, normally appear without commas. Write the binary code for the letter k.
Computers and Technology
1 answer:
poizon [28]3 years ago
8 0

Answer:

01101011

Explanation:

k = ascii code 107, which is 0x6b in hex and 0110 1011 in binary.

You might be interested in
HELP I WILL GIVVE BRAINLY AND 15 POINTS
levacccp [35]

Answer:

Because someone was hittting the space bar in the message instead of typing letters and numbers

Explanation:

Because they were bored or it was a glitch

4 0
3 years ago
Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
vesna_86 [32]

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

3 0
3 years ago
Whats my screen name?
adoni [48]
It could be any thing of your chose
8 0
3 years ago
Read 2 more answers
what is the command used to retrieve the java files along with the string existence "Hello world" in it​
Leona [35]

Answer:

java” xargs grep -i "Hello World”

8 0
2 years ago
List the steps to look it install and then run a program or mobile app
Luda [366]

Answer:

1. Open a cloud installer (the source), which is usually Play Store, Aptoide, or UpToDown, in the case of Android phones.

2. Request the package from the server, which will be transmitted via an internet connection. Usually called "downloading".

3. Allow the package provider (mobile store) to install the app on the system, this being the "install" part, where it's put together.

4. Run the app by, usually, pressing the icon in the app drawer.

3 0
3 years ago
Other questions:
  • Which IPv6 transition technology can be used with NAT routers and has the address prefix 2001::32?
    10·1 answer
  • What type of organism forms the base of food webs?
    9·1 answer
  • Write a program that computes and displays a 15 percent tip when the
    9·1 answer
  • Use the _______ command to combine the selected cells and center them. merge across center across selection merge cells merge an
    7·1 answer
  • A star appears under the <br> menu of the word processing program.
    5·1 answer
  • What is the disadvantage of a mesh topology?
    12·2 answers
  • What Word features allow you to copy multiple paragraph formatting syles
    5·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • Mobile apps are replacing the old__________<br><br>​
    7·2 answers
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!