1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
8

​What is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses?

Computers and Technology
1 answer:
Mariulka [41]4 years ago
7 0
I'm not sure that this is what you're looking for:

Bit (BInary digiT). Nybble = 4 bits. Byte = 2 nybbles or 8 bits. Word is usually the data bus width of a computer, 4 byte (32 bit) words are giving way to 8 byte (64 bit) machines.
You might be interested in
Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to inter
koban [17]
Interpersonal skills.
6 0
3 years ago
Read 2 more answers
6.10.1: Modify a C string parameter. Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley.
Andrej [43]

Answer:

#include <iostream>

#include <cstring>

using namespace std;

void replacePeriod(char* phrase) {

int i = 0;

while(*(phrase + i) != '\0')

{

if(*(phrase + i) == '.')

*(phrase + i) = '!';

i++;

}

}

int main() {

const int STRING_SIZE = 50;

char sentence[STRING_SIZE];

strcpy(sentence, "Hello. I'm Miley. Nice to meet you.");

replacePeriod(sentence);

cout << "Updated sentence: " << endl;

cout << sentence << endl;

return 0;

}

Explanation:

  • Create a function called replacePeriod that takes a pointer of type char as a parameter.
  • Loop through the end of phrase, check if phrase has a period and then replace it with a sign of exclamation.
  • Inside the main function, define the sentence and pass it as an argument to the replacePeriod function.
  • Finally display the updated sentence.
6 0
3 years ago
Design the logic for a program that outputs every number from 1 through 15.
ankoles [38]
Not sure what programming language, but i'll use Java

print (1)
print (2)
print (3)
print (4)
print (5)
print (6)
print (7)
print (8)
print (9)
print (10)
print (11)
print (12)
print (13)
print (14)
print (15)
3 0
3 years ago
Read 2 more answers
What is an example of value created through the use of deep learning?
vichka [17]

An example of value which is created through the use of deep learning is: b. reducing multi-language communication friction in a company through automatic language translation.

<h3>What is machine learning?</h3>

Machine learning (ML) is also known as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

In Machine learning (ML), data-driven techniques (methods) can be used to learn source ranges directly from observed multi-language communication.

In this context, we can infer and logically deduce that an example of value which is created through the use of deep learning is reducing multi-language communication friction that exist among employees working in a company through automatic language translation.

Read more on machine learning here: brainly.com/question/25523571

#SPJ1

8 0
2 years ago
In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
fenix001 [56]

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

3 0
3 years ago
Other questions:
  • Which one of the secondary storage types below would be best if you wanted to edit files and re-save them to secondary storage?
    10·1 answer
  • Which statement accurately compares the Restart at 1 and Continue Numbering features of Word?
    13·2 answers
  • Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
    11·2 answers
  • Which operating system became obsolete with the arrival of more advanced graphical user interfaces
    12·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • 6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then
    15·1 answer
  • Question of Computer science​
    7·1 answer
  • What's your fav show?
    12·2 answers
  • 1. My grandma and I went shopping to look for old
    12·1 answer
  • What type pf physical security devices lets a company locate devices that have been moved to a new location?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!