1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixas84 [53]
4 years ago
9

True/False: The American Standard Code for Information (ASCII) is a code that allows people to read information on a computer.

Computers and Technology
2 answers:
Firdavs [7]4 years ago
8 0

Answer:

1. True - ASCII is a standard through which allows people to "decipher" binary code.

2. True - A program is made up of instructions known as source code, written by a programmer. The computer (CPU) executes these instructions and perform operations based on them.

3. Storage - All these devices are storage mediums and can store data. You can read and write data in these devices.

4. Keyboard - Keyboard is an input peripheral that can be used to enter/type information in a computer system.

5. 8 bits - A single byte has 8 bits or binary digits.

6. CPU - The brains of a computer system, that is responsible for everything a computer can do e.g. play games, play music, view stuff etc.

7. Smartphone -> c.

   Program -> e.

   Super computer -> d.

   Desktop -> a.

   Tablet -> f.

   Computer -> g.

   Mainframes -> h.

   Notebook -> b.

8. processing (CPU), input (mouse, keyboard, mic), output (monitor, speaker, printer), storage (HDD, Ram, Rom).

9. Monitor - One of the main parts of a typical computer system. Used to output results of CPU.

10. mouse, keyboard - Two of the most important input devices of a computer. Used to perform tasks and type information.

11. False - You can't use a storage device for giving input or showing output.

Explanation:

Vanyuwa [196]4 years ago
6 0
1. true
2. false
3. storage
4.cpu
hope i helped

You might be interested in
Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
Alja [10]

Answer:

The answer is "Option c"

Explanation:

Plug and Play is a general term that is used to define gadgets operating with a computer network while connected to it. This technology allows the hardware to use automatically by adding it, and other option can be described as follows:

  • In option a, This technology is used in monitoring the commercial vehicles system, which is why it's incorrect.
  • In option b, It is wrong because It is used in Microsoft Windows, which increases the physical security.
  • In option d, It describes the details about the hardware and switches to configure the device, that's why it is incorrect.
5 0
3 years ago
A communications objective is
Kazeer [188]

Answer:

They are used to identify your audience, craft messages and evaluate results. Communication Objectives are - as the name suggests – the process of setting targets for communication.Changing company or brand perceptions is another common communication objective.

Hope this helps! If so please mark brainliest and rate/heart to help my account

8 0
4 years ago
What is a computer ?​
Ivenika [448]

Answer:

Computer

Explanation:

Computer defines to an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

4 0
3 years ago
Read 2 more answers
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
Burka [1]

Answer:

R's share = 306

Explanation:

Sum of ratio = 1/3 + 1/2 + 1/5

LCM = 30

Sum of ratio = (10 + 15 + 6) / 30 = 31 /30

Profit to be shared = 1581

P = 1/3 ; Q = 1/2 ; R = 1/5

Share of R :

(Total profit / sum of ratio) * R ratio

[1581 / (31/30)] * 1/5

(1581 / 1 * 30/31) * 1/5

51 * 30 * 1/5

51 * 6 = 306

5 0
3 years ago
Other questions:
  • Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
    7·1 answer
  • What is a mortgage?
    8·2 answers
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • Design a Ship class with the following members:
    13·1 answer
  • What is a Joint Staff approved, standardized communications link that is suitable for the transmission of digital information an
    5·1 answer
  • Given the 8-bit binary code 10011011, what is the equivalent decimal value?
    5·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • Hlo Brainlians !!
    11·2 answers
  • Which statement best describes the computers all around us?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!