1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
13

The standard qwerty keyboard has 47 keys that can place characters on the screen. each of these keys can also display a second c

haracter by holding the "shift" key at the same time. how many bits would you need to encode everything that could be typed on this keyboard?
Computers and Technology
2 answers:
VMariaS [17]3 years ago
8 0

Answer:

You need 7 bits to encode everything that could be typed on this keyboard.

Explanation:

The encoding of the QWERTY keyboard is based on the extended ASCII encoding. The "ASCII" code was created by the "American standards association" in 1963.The acronym of “American Standard Code for Information Interchange” is ASCII. ASCII is a 7-bit \text{character} code.

Further Explanation:

The QWERTY keyboard is the standard computer and typewriter keyboard design for Latin-script alphabets. The first six letters of the keyboard's upper row indicate its name.  Christopher Latham Sholes designed the layout of the keyboard for his "Type-Writer".  It was first mass-produced in 1874.

In QWERTY keyboard, extended American Standard for Information Interchange (ASCII) method is used for characters encoding. Alphabetical order of English language is the base of ASCII method of characters encoding.

Learn More:

  • Learn more about QWERTY keyboard: brainly.com/question/649081; Answered by: Jessusulas

  • Learn more about ASCII: brainly.com/question/7851735; Answered by: LearnGrow

Keywords:

QWERTY keyboard, The encoding of the QWERTY keyboard, American Standard for Information Interchange, ASCII

stepladder [879]3 years ago
7 0

The standard QWERTY keyboard has 47 keys that can place characters on the screen. Each of these keys can also display a second character by holding the "Shift" key at the same time. How many bits would you need to encode everything that could be typed on this keyboard?

The answer is 7 bits

You might be interested in
NEED ANSWER ASAP. CORRECT ANSWER GETS BRAINLIEST! TY
Tasya [4]

Answer:

scope because the scope will determine the Time for the employee to work

8 0
3 years ago
The process of making raw materials into a finished product is known as
Olin [163]
1.) Business Engineering or Manufacturing :)
<span />
6 0
2 years ago
Read 2 more answers
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
A custom information field that helps users to find a specific document is called
Vlada [557]
Database, a collection of information, basically an electronic filing system.. it helps users to <span>quickly </span><span>select and </span>find a desired pieces of data.
3 0
3 years ago
Read 2 more answers
Why is continual user involvement a useful way to discover system requirements? Under what conditions might it be used? Under wh
True [87]

Answer:

continual user involvement gives the flexibility to analyze the requirements in right direction. because there is continuous meetings with the end user and he can provide right direction or avoids wrong interpretation of the requirement

Explanation:

continual user involvement is useful when we are following agile methodology where we are building complex systems. it is not useful for simple sytems and following waterfall methodology

7 0
3 years ago
Other questions:
  • What is the output of the following program?
    8·1 answer
  • What exactly is a byte? A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one speci
    10·1 answer
  • A __________ is the column of data in a database that is used as the basis for arranging data.
    8·2 answers
  • Consider the attack scenario given below:
    8·1 answer
  • Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
    5·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • HELP PLSSS I WILL MARK U!!!!
    10·2 answers
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
  • Select all the correct answers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!