1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
13

Advantages of ASCII over EBDCDIC​

Computers and Technology
1 answer:
KiRa [710]3 years ago
7 0
<h3>Efficiency. Moreover, the same character in ASCII requires 7 bits, but EBCDIC required 8 bits. Therefore, ASCII is more efficient than EBCDIC.</h3>

You might be interested in
What is a spark line? how is a different a chart​
Neporo4naja [7]

Answer:

A sparkline is a tiny chart in a worksheet cell that provides a visual representation of data.

5 0
3 years ago
___ is a career discipline focusing on helping companies use computer technology effectively.
pickupchik [31]

Answer:

A (information technology)

Explanation:

4 0
2 years ago
What was the term, “cyberspace,” originally used to describe?
WITCHER [35]

Answer:

What was the term "cyberspace" originally used to describe? the account of artificial intelligence found in some science fiction. Although many people incorrectly use the terms interchangeably, the Internet and the World Wide Web are not the same.

Explanation:

8 0
2 years ago
Which of the following is NOT true about adjustment layers? brainbuffet
otez555 [7]

Answer the adjustment layers can not be used a lot?

Explanation: i think that was it

6 0
3 years ago
Pls help me, it's due today​
Leviafan [203]

Answer:

1. Electronic devices

2. B= Headphones, C= projector, d= computer, e= speakers, g= printer

Explanation:

i dont know  what A and F are sorry

6 0
3 years ago
Read 2 more answers
Other questions:
  • 4. The clutch pedal is found in cars with manual and automatic transmissions.
    6·1 answer
  • Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
    8·1 answer
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.
    6·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • What gaming PC should I get
    14·2 answers
  • Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
    6·1 answer
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • Choose the term that completes the sentence.
    14·2 answers
  • Which of the following statements is true for plotly?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!