1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
9

How many bits does it take to represent the values from 0 to 255?

Computers and Technology
1 answer:
valentina_108 [34]3 years ago
5 0
2^8 = 256 hence use 8 bits
You might be interested in
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
meriva

Answer:

Data base administrator

Explanation:

The data base administrator is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field , constraints and access methods. Database is structured from of data sets.  

The data in database use to come from different sources that data must have some boundaries. Database administrator is a part of DBMS. The authorized DBA is responsible for the integrity of data and keeping the data in good manner so at the time of need the data could be accessed rightly. Storage of data has to be  done in a way that at time of use or at the time of retrieval the data must be accessed frequently and easily.  

Database administrator is responsible to put constraint on the database, for example a person could enter how many digits or alphabets in the required fields or records. Otherwise user could enter irrelevant and lengthy data in the fields so it would be hard to manage data on server due to shortage of the memory. By putting such constraints the size of data could be managed and relevant data could be saved. Secondly, constraints use to be put for security purpose to keep information confidential and secure the  certain constraints are mandatory and the data base administrator is responsible for such constraints.

Once the user use to store data on database the data safety and integrity is most important for them. So that DBA will arrange the data in organised form which will give quick access and data length will be managed properly so user could not enter lengthy data to full the repository. DBA put security constraint as well for the satisfaction of user and secure use of the database.

So we could say that dba is most important part of DBMS of any organization.

5 0
3 years ago
The program to check the highEst of n numbercan be done by ......,..
swat32

Answer: Given an array of numbers, arrange them in a way that yields the largest value. For example, if the given numbers are {54, 546, 548, 60}, the arrangement 6054854654 gives the largest value. And if the given numbers are {1, 34, 3, 98, 9, 76, 45, 4}, then the arrangement 998764543431 gives the largest value.

Explanation: If you need more help follow me on istagram at dr.darrien

-thank you

7 0
3 years ago
I need help!!!!
GarryVolchara [31]
I would probably go with option B.
3 0
2 years ago
Read 2 more answers
When dealing with perspective, _____ lines are used or implied.
iris [78.8K]

Answer:

I'm pretty sure the answer is vanishing lines.

Explanation:

7 0
3 years ago
Other questions:
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • What theme could come from Piper's feelings and actions. Pixars short film piper
    11·1 answer
  • The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
    15·1 answer
  • Nosql is a great technology for storing well-structured data. <br> a. True <br> b. False
    8·1 answer
  • Both the Alphabetic Index and the Tabular List must be used to locate and assign a diagnosis code in ICD-10-CM. Group of answer
    7·1 answer
  • Which of the following is the BEST solution to allow access to private resources from the internet?
    9·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • What are the importance of Help and Support feature of Windows​
    6·1 answer
  • What is phishing?
    14·1 answer
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!