1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
9

Which of the following best describes how computing devices represent information? A. A computer will either represent informati

on as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.
Computers and Technology
2 answers:
aniked [119]3 years ago
8 0

Answer:

c

Explanation:

lana66690 [7]3 years ago
5 0

Answer:

The Answer is B

Explanation:

The reason the answer is B is because "bytes" are the correct form of storing memory in 0's and 1's.

You might be interested in
We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for th
4vir4ik [10]

Answer:

Explanation: This seems more like an opinion answer so give your opinion, try yout best, just trying to help ;)

5 0
3 years ago
rocess inputs using the following 1) Write a function that inputs numerical digits in the range of an unsigned short. 2) Write a
yawa3891 [41]

Answer:

 /* sizeof.c—Program to tell the size of the C variable */

 /*      type in bytes */

 

 #include <stdio.h>

 

   int main(void)

  {

  printf( "\nA char   is %d bytes", sizeof( char ));

  printf( "\nAn int   is %d bytes", sizeof( int ));

  printf( "\nA short   is %d bytes", sizeof( short ));

  printf( "\nA long   is %d bytes", sizeof( long ));

  printf( "\nA long long is %d bytes\n", sizeof( long long));

  printf( "\nAn unsigned char is %d bytes", sizeof( unsigned char ));

  printf( "\nAn unsigned int  is %d bytes", sizeof( unsigned int ));

  printf( "\nAn unsigned short is %d bytes", sizeof( unsigned short ));

  printf( "\nAn unsigned long is %d bytes", sizeof( unsigned long ));

  printf( "\nAn unsigned long long is %d bytes\n",

   sizeof( unsigned long long));

 printf( "\nA float   is %d bytes", sizeof( float ));

 printf( "\nA double  is %d bytes\n", sizeof( double ));

 printf( "\nA long double is %d bytes\n", sizeof( long double ));

return 0;

 }

2. #include<stdio.h>

int main(){

  int num,reverse_number;

  //User would input the number

  printf("\nEnter any number:");

  scanf("%d",&num);

  //Calling user defined function to perform reverse

  reverse_number=reverse_function(num);

  printf("\nAfter reverse the no is :%d",reverse_number);

  return 0;

}

int sum=0,rem;

reverse_function(int num){

  if(num){

     rem=num%10;

     sum=sum*10+rem;

     reverse_function(num/10);

  }

  else

     return sum;

  return sum;

}

3.  

#include <bits/stdc++.h>  

 

using namespace std;  

/* Iterative function to reverse digits of num*/

int reversDigits(int num)  

{  

   int rev_num = 0;  

   while(num > 0)  

   {  

       rev_num = rev_num*10 + num%10;  

       num = num/10;  

   }  

   return rev_num;  

}  

 

/*Driver program to test reversDigits*/

int main()  

{  

   int num = 4562;  

   cout << "Reverse of no. is "

        << reversDigits(num);  

   getchar();  

   return 0;

4 0
3 years ago
3n - 12 = 5n - 2<br> how many solutions?
Luda [366]
N=-5 sry about the other guy stealing
6 0
3 years ago
Choose the correct term to finish the program. When done, the contents of info will be as shown.
RideAnS [48]

Answer:

The correct term is info.pop(7)

Explanation:

Given:

info = {3:10, 4:23, 7:10, 11:31}

Required

Which term removes 7:10 from the dictionary

To remove an item from a dictionary in Python, you follow the syntax below:

[dictionary-name].pop(key)

In this case:

The dictionary name is info and the key is 7

So, the term that implements the syntax is: <em>info.pop(7)</em>

After the instruction <em>info.pop(7)</em> is executed, the content of the dictionary becomes: {3: 10.4:23, 11:31}

4 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
    15·1 answer
  • How do you enlarge your screen if there is no control panel? Need desperate help!
    15·1 answer
  • The first synthesizers were small simple machines that were easy to use. a. true b. false
    12·1 answer
  • What is the answer to this question?
    10·1 answer
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • What happens after the initial rollout of a new network generation?
    10·1 answer
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
  • Use port in a sentence
    7·1 answer
  • In the classic experimental design, there are two groups: the _____ group and the _____ group.
    12·1 answer
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!