1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
4 years ago
10

Many languages do not use the characters of U.S. English. Suppose you wanted to be able to encode the characters of every langua

ge on earth within a single protocol. Guess how many characters would need to be encoded and calculate the number of bits that would be required per character. Then discuss the benefits and drawbacks of using this single unified system.
Computers and Technology
1 answer:
serg [7]4 years ago
4 0
UTF-16 does this. One of the Chinese dialects has 28,000+ characters.
You might be interested in
What was the computer works in binary functions
Mariulka [41]
Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.
7 0
3 years ago
What is the name of a popular high-level computer programming and scripting language that is the name of a snake?
Murljashka [212]
The name of the programming language is PYTHON.
Python is a popular, high level programming language that is used for general purpose programming. Python is objected oriented  and it uses dynamic typing for memory management. The programming language was created in the late 80's by Guido Van Rossum.
7 0
4 years ago
Which stream of digital arts are content manager, content developer, flash developer, and information architect a part of?
Varvara68 [4.7K]
Its A. web design (plato)
5 0
4 years ago
Law Enforcement Online (LEO) is a secure intranet system created and maintained as a tool for communicating, obtaining mission-c
zalisa [80]

Answer:

Federal Bureau of Investigation

Explanation:

LEO seems to be a protected intranet network developed as well as operated as a resource for networking, accessing task-critical information, delivering or engaging through online training services, as well as engaging in technical or contextual conversations for concern. The Federal Bureau of Investigation seems to be accountable for managing LEO.

  • Option A is not correct according to the statement because It is primarily responsible for organizing as well as conducting US narcotics operations including domestically as well as internationally.
  • Option C is not correct according to the statement because it is responsible for terrorist attacks and other disasters.
3 0
3 years ago
A ____ is an area in ram or on the hard drive designated to hold input and output on their way in or out of the computer system.
Goshia [24]

A buffer is a region in RAM or on the hard drive assigned to hold information and yield on their way in or out of the framework. In <span>computer science , <span>an information cushion or simply support is a zone of a physical memory stockpiling used to briefly store information while it is being progress starting with one place then onto the next. However, a buffer might be utilized while moving information between forms inside a PC.</span></span>

4 0
4 years ago
Other questions:
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • Explain in your own words how you can use MSCONFIG and Task Manager to troubleshoot problems on the computer.
    15·1 answer
  • Changes in computer technology have an effect on _____. computer scientists only people who work with computers only everybody p
    12·2 answers
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • 1. The first popular animated feature film was 1937’s Snow White and the Seven Dwarfs. (1 point)
    8·1 answer
  • Files exist on ____ storage devices, such as hard disks, dvds, usb drives, and reels of magnetic tape.
    11·1 answer
  • What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP add
    9·1 answer
  • How do i code........​
    6·2 answers
  • Python: Write a program for a small restaurant that sells pizzas. You may consider it as a prototype of a realistic online appli
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!