1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
8

What values can represent a bit

Computers and Technology
1 answer:
hodyreva [135]3 years ago
7 0

Answer:

Bit values are most commonly represented as either "1" or "0", but other representations such as true / false, yes / no, + / −, or on / off are common.

Explanation:

Hope it Helps!

You might be interested in
By changing the field size for text to the maximum number necessary,
Inessa05 [86]

Answer:

The correct option is;

A. The file will not take up as much space on the database

Explanation:

Changing the field size of a field that does not contain data limits the size of taken up by the data values added to the field. The field size for text field determines the disc space that each value of the field allowed to take up by Access

When the field size is changed for fields containing data, the data values in the field that have values higher than the maximum field size are truncated while the field size of subsequent data are limited as stated above.

8 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Create the SQL statements for displaying the results for each of the following scenarios in the Academic Database. Save these st
Whitepunk [10]

Answer:

CREATE FUNCTION exam_eligible_students

   RETURN NUMBER AS

   num_students NUMBER(15);

BEGIN

   SELECT COUNT(STUDENT_ID)

   INTO num_students

   FROM STUDENT_ATTENDANCE

   WHERE ELIGIBILITY_FOR_EXAMS = 'Y';

   

   RETURN (num_students);

END;

Explanation:

exam_eligible_students is a made of name for the FUNCTION to be called.

num_students is a made up name for the RETURN to be called. The RETURN name is referenced in the INTO statement and as the name of the the return in the RETURN line in ().

4 0
3 years ago
Best programming languages? So far I have only learned html.​
Volgvan

Answer:

it's all up to personal preference some different ones have upsides and downsides but it's more of what you feel is best

4 0
3 years ago
In short and brave what is technology?
emmainna [20.7K]

Answer:

technology is a whole means to provide goods needed for the survival and comfort of human life

8 0
3 years ago
Read 2 more answers
Other questions:
  • In a database, a collection of related fields that describes some object or activity is referred to as a ____.
    9·1 answer
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • ___ is an example of a function prototype.
    12·1 answer
  • How many Iron molecules are in the compound Fe4O2?
    15·2 answers
  • Please answer.
    9·1 answer
  • 3.5 code practice question 1
    5·2 answers
  • Which tags do you use to write the header and items of an ordered list on a web page?
    14·1 answer
  • Given the following class, Book, Write code for the following:
    8·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!