1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
13

The standard qwerty keyboard has 47 keys that can place characters on the screen. each of these keys can also display a second c

haracter by holding the "shift" key at the same time. how many bits would you need to encode everything that could be typed on this keyboard?
Computers and Technology
2 answers:
VMariaS [17]3 years ago
8 0

Answer:

You need 7 bits to encode everything that could be typed on this keyboard.

Explanation:

The encoding of the QWERTY keyboard is based on the extended ASCII encoding. The "ASCII" code was created by the "American standards association" in 1963.The acronym of “American Standard Code for Information Interchange” is ASCII. ASCII is a 7-bit \text{character} code.

Further Explanation:

The QWERTY keyboard is the standard computer and typewriter keyboard design for Latin-script alphabets. The first six letters of the keyboard's upper row indicate its name.  Christopher Latham Sholes designed the layout of the keyboard for his "Type-Writer".  It was first mass-produced in 1874.

In QWERTY keyboard, extended American Standard for Information Interchange (ASCII) method is used for characters encoding. Alphabetical order of English language is the base of ASCII method of characters encoding.

Learn More:

  • Learn more about QWERTY keyboard: brainly.com/question/649081; Answered by: Jessusulas

  • Learn more about ASCII: brainly.com/question/7851735; Answered by: LearnGrow

Keywords:

QWERTY keyboard, The encoding of the QWERTY keyboard, American Standard for Information Interchange, ASCII

stepladder [879]3 years ago
7 0

The standard QWERTY keyboard has 47 keys that can place characters on the screen. Each of these keys can also display a second character by holding the "Shift" key at the same time. How many bits would you need to encode everything that could be typed on this keyboard?

The answer is 7 bits

You might be interested in
1. Describe your Microsoft word skills that need to be improved upon the most. 2. Explain the Microsoft word skills you are most
Andrei [34K]

Answer:

The answer varies from person to person.

Explanation:

All kinds of people are using Word, so people would recognize if the answer if plagiarized. So, simply answer truthfully; no matter h1ow embarrasing.

7 0
4 years ago
What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
sladkih [1.3K]
The advantage does of ExpressCard modules and U.S.B adapters offer over expansion cards is that it can connect a variety of devices to a computer. The technical standard of ExpressCard specifies the design of slots built into the computer and of expansion of cards to insert in the slots including the mobile broadband modems. It is sometimes connectors for externals devices such as flash drives, USB connectors and other ports that need to connect to the computer.
4 0
4 years ago
A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
pychu [463]
Firewall
Dont forget to thanks and give brianliest.
4 0
4 years ago
Renter’s insurance is not necessary if you don’t have a lot of expensive things.
attashe74 [19]

Wrong, You should get renters insurance to insure your items that you do have or will recieve in the future are safe

7 0
3 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
4 years ago
Other questions:
  • Ascending and descending are examples of
    5·2 answers
  • the control programs managing computer hardware and software use the ______ function to control and prioritize tasks performed b
    8·1 answer
  • A variation of pronounce is a. Proclaim c. Produce b. Profound d. Pronunciation Please select the best answer from the choices p
    11·1 answer
  • Panes created using the vertical split bar scroll together horizontally. true or false.
    12·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • What is Error Code: 232011
    11·2 answers
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
  • What are some preferences you can set in photoshop?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!