1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
15

How many bits would be needed if there is 15 students in the class

Computers and Technology
1 answer:
Anni [7]3 years ago
8 0

Answer:

Bits??

Explanation:

You might be interested in
A computer’s BIOS is defined as the
Dennis_Churaev [7]
Basic input/output system
5 0
3 years ago
Read 2 more answers
Please i need your help
motikmotik
Hello!

The answer would be:

C. non-linear navigation.

Explanation: Non-linear navigation lets a user navigate through material without them having to follow a strict order.

I hope that this helps you!
3 0
2 years ago
The cardinality of the friend_of relationship set between two student entities in the student entity set should be:
Afina-wow [57]

Answer:

One to One Relationship

Explanation:

Given that in a computer systems analysis about an entity-relationship model, a one-to-one relationship is a form of cardinality that involves the relationship that exists between two different entities Y and Z, such that one element Y can only be associated with one element Z, or in the other way round.

Hence, the cardinality of the friend_of relationship set between two student entities in the student entity set should be: "One to One Relationship"

3 0
3 years ago
Windows service accounts will use passwords consisting of at least
KonstantinChe [14]
<span>Windows service accounts will use passwords consisting of at least 15 characters</span>
7 0
4 years ago
This is for the folks that is rude:
S_A_V [24]
This isn’t twitter but anyways the answer is 29
8 0
4 years ago
Other questions:
  • The smallest unit of storage in the following list is a
    7·1 answer
  • Do you think that people have a “right” to remain anonymous online? Why or why not?
    6·1 answer
  • 6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)​
    8·2 answers
  • Can you give me a long list of kid's cartoons
    15·1 answer
  • David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
    10·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • Public-key encryption schemes are secure only if the authenticity of the ___________ is assured.
    12·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • 13. You're emailing your grandparents. Which of the following is the best example of digital etiquette?
    5·2 answers
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!