1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
9

Assume that a single page of printed text requires 52 lines of text, and that each line of text averaged 80 characters. If each

character takes up two bytes of storage, how many bytes are required to hold a 500 page novel?
Computers and Technology
1 answer:
zysi [14]3 years ago
5 0

Answer:

4160000 bytes

Explanation:

One page = 52 lines of text

One line of text = 80 characters

=> One page = 80 x 52 = 4160 characters

Therefore, 500 pages of text will have 4160 x 500 characters = 2080000 characters.

Since 1 character takes up 2 bytes of computer memory, it impleies that a 500 page novel will take up 2080000 x 2 bytes = 4160000 bytes.

You might be interested in
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
alexira [117]

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

8 0
3 years ago
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?
KATRIN_1 [288]

Answer:

Under IEEE 802.1Q, the maximum number of VLANs on a given Ethernet network is 4,094 (4,096 values provided by the 12-bit VID field minus reserved values at each end of the range, 0 and 4,095).

Explanation: found it from google

6 0
3 years ago
Read 2 more answers
Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
frozen [14]
Target audience for the brochure
4 0
3 years ago
Read 2 more answers
________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pict
timofeeve [1]

Answer:

"Object-oriented" would be the correct choice.

Explanation:

  • An object-oriented database seems to be a database that subscribes to a framework containing object-depicted details. Throughout the context of the relational database management system, object-oriented is a unique product that is not as popular and most well-known as traditional web applications.
  • This indicates that internet connectivity to existing records has to implement the previously defined connections for interacting components established by that same containers.
3 0
3 years ago
What is the name of the file manager in microsoft windows?
Ivan
It is called Windows Explorer referred as explorer.exe<span />
7 0
3 years ago
Read 2 more answers
Other questions:
  • divide the input array into thirds (rather than halves), recursively sort each third, and finally combine the results using a th
    15·1 answer
  • The concept of plug and play" is demonstrated by which of the following
    15·1 answer
  • What pressure will be shown on the high side peessure gauge (ac system on)
    12·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • Which of the following focuses on information related to disease identification, control, and prevention?
    10·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Windows displays a(n)
    11·1 answer
  • If im downloading a game at 4mb/s how many minutes would it take to download 25 GB
    14·2 answers
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!