1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​

Computers and Technology
2 answers:
wariber [46]3 years ago
5 0

Answer:

Umm was there supposed to be a picture????

Explanation:

Hope you have a wonderful Christmas Eve time with your family!!❄️

yanalaym [24]3 years ago
4 0

Answer:

hello ...........oooo

You might be interested in
Describe two benefits of the community of replacing the printed copy with an online version.
DiKsa [7]

Answer:

less costs

Explanation:

saves more money

easy to use for everyone

6 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
What is spam? electronic junk mail e-mail abuse e-mail subscriptions the e-mail server the opt out feature unethical use of e-ma
expeople1 [14]

Answer:

electronic junk mail.

Explanation:

7 0
3 years ago
How to do a row of circles on python , with the commands , picture is with it .
kotykmax [81]

Answer:

o.o

Explanation:

5 0
3 years ago
The main activity area or the brain of the computer is called the ________
Darya [45]

Motherboard

Its a computer chip



6 0
3 years ago
Other questions:
  • What company handles security for a lot of the e-commerce on the internet and also maintains two root name server clusters?
    8·1 answer
  • Which term represents a computational instruction stored in computer memory?
    13·2 answers
  • Allow chrome to access the network in your firewall or antivirus settings. if it is already listed as a program allowed to acces
    15·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    14·1 answer
  • Women make up 52 percent of the voting-age population and are more likely to vote, yet
    12·2 answers
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • 7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
    5·1 answer
  • Rock climbing fun html
    12·1 answer
  • Passwords are usually alphanumeric and usually cannot contain spaces or ________.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!