1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
3 years ago
12

Cuales son los multiplos de un byte

Computers and Technology
1 answer:
GalinKa [24]3 years ago
8 0

Answer:

I hope this works for u

Explanation:

1 GIGABYTE = 1Gb = 1024 Mb = 1.000.000.000 bytes. 1 TERABYTE = 1Tb = 1024 Gb = 1 billon de bytes. 1 PETABYTE = 1Pb = 1024 Tb = Mill billones de bytes. 1 EXABYTE = 1 Eb = 1024 Pb = 1 trillon de bytes.

Can I have a brainliest..

Puedo tener un brainliest

Plz :3

You might be interested in
A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code.
kirill115 [55]

Answer:

2 lines

Explanation:

The "w" flag will overwrite any content, so the existing 80 lines are lost.

Then, if you write two lines, there are two lines in the file.

You could argue that the final newline character causes a third line to be present, but logically, there are two lines.

3 0
3 years ago
Read 2 more answers
Give two examples of desktop publishing software
soldier1979 [14.2K]
There are quite a lot of desktop publishing software as of today.
I'll give you the names of some of it.
- Adobe inDesign - one of the most popular
- Corel Draw
- Microsoft Publisher
- Serif
- Ultra Xml
And more.
There are actually a lot if you are just about to check in the internet.
7 0
4 years ago
_____ are used to associate a style sheet or style rule with a specific device or list of device features.â
Usimov [2.4K]
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
6 0
3 years ago
Read 2 more answers
What can help establish the focus and organization it relies on? A) Plan B) programming C) organizing D) arranging
serg [7]

Organizational communication helps us to

1) accomplish tasks relating to specific roles and responsibilities of sales, services, and production

2) acclimate to changes through individual and organizational creativity and adaptation

3) complete tasks through the maintenance of policy, procedures, or regulations that support daily and continuous operations

4) develop relationships where “human messages are directed at people within the organization-their attitudes, morale, satisfaction, and fulfillment”

5) coordinate, plan, and control the operations of the organization through management.

So the answer is C.

hope it helps!

7 0
3 years ago
Read 2 more answers
Which of the following is true of two-factor authentication?
dybincka [34]

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

7 0
3 years ago
Other questions:
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.
    12·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    6·2 answers
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • GOOD EVENING, FRIENDS, I WANT TO ASK ON THE ACCOUNT OF HIS NAME‏BENJEMIN360 . THIS ANSWERS ARE VERY WONDERFUL, BUT I CAN'T COMMU
    6·1 answer
  • _____ are fields that are used to personalize a mail merge document
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!