1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
5

1byte= ________ bits

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
3 0

Explanation:

1 byte=8bits

1 nibble = 4bits

1MB= 8000000bits

1PB= 1000TB

1ZB= 1000000000000EB

You might be interested in
Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
Naddika [18.5K]
Efficiency because if you don't have very good efficiency then somebody can't really read it so they won't know what it's saying.
5 0
4 years ago
Which of the following occurs during data cleansing?
Diano4ka-milaya [45]

Answer:c)Clean redundant customer data

Explanation:Data cleansing/cleaning is the activity for the elimination of the data which is not required for further use, corrupt, unnecessary etc by detecting it. The data that is being cleared is categorized by levels like irrelevant  data, incorrect data, inaccurate data, redundant data etc.

The data is eliminated by the method of correcting , modifying, reducing unnecessary parts,deleting, etc.Thus, the correct option is option(C).

5 0
4 years ago
Lian is asked to create a variable that will keep track of how many times the user has tried to enter their password. What kind
Kisachek [45]
What are the answers?

Hdhdhdgd. Oxide
4 0
3 years ago
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characte
Stels [109]
That would be your name and then you date of birth 
6 0
3 years ago
Read 2 more answers
What is another word for controls​
viktelen [127]

Answer:

command jurisdiction

sway

power

authority

command

dominance

domination

government

mastery

leadership

rule

reign

Explanation:

4 0
3 years ago
Other questions:
  • In Windows 2000 and later, the ____ command shows you the file owner if you have multiple users on the system or network.
    15·1 answer
  • A claim that is printed and mailed to the carrier site is called a _______copy?
    13·1 answer
  • Which license enables anyone on the network to install and use the software?
    14·1 answer
  • A group of computers that are interconnected order to share information or document is called a
    12·2 answers
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • Vertebrates first arrived during the _________________.
    9·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • Fill in the blanks
    7·1 answer
  • What is a megavirus in computing
    8·2 answers
  • Write a simple program that takes in a numerator and denominator and then computes the GCD for that fraction. You can assume tha
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!