1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
9

How many bits would be needed to count all the students in class today

Computers and Technology
1 answer:
ladessa [460]3 years ago
4 0

Answer:

5 bits

Explanation:

Most classes have around 20 student with a 5-bit system goes up to 31 ( 1+2+4+8+16) and a 4-bit system(1+2+4+8) goes up to 15. Bits are the 1s and 0s and so a 5-bit system looks like this: 01001(18).

You might be interested in
A _______ attack is where the input includes code that is then executed by the attacked system.
sweet [91]

Answer: Code injection

Explanation:

3 0
2 years ago
Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
vichka [17]

Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.

4 0
3 years ago
A device that allows multiple computers to communicate with each other is
Lapatulllka [165]

Answer:

A device that allows multiple computers to communicate with each other is

Network Hub.

Hope this helps!

:)

4 0
3 years ago
Assembling parts and using various machines to create a final product is the process of ______.
s2008m [1.1K]

Answer:

Hey bro! Sorry to bother. But have any of your questions got deleted after posting them? I don't know why my question got deleted by a guy.

Explanation:

8 0
4 years ago
To view a friend's calendar, you must request access.<br> A) True<br> B) False
Anettt [7]

Answer:

True the answer is true

Explanation:

I hope this helps

6 0
3 years ago
Read 2 more answers
Other questions:
  • RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
    15·1 answer
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
    12·1 answer
  • Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve
    13·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • COMPUTER FUNDIMENTAL HELP 20 POINTS!!!
    5·1 answer
  • Please help due today please help me!!!!!
    15·1 answer
  • How do you get the value of an element in an array? And how about for an ArrayList?
    14·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
  • Can somebody please help me with these few questions?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!