1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
7

Computer memory uses different numbers of bytes to store different data types.

Computers and Technology
1 answer:
Cloud [144]3 years ago
6 0

Answer:

One, four

Explanation:

A character is 8 bits (one byte) and a single precision floating point is 32 bits (four bytes).

You might be interested in
Write a Python program to balance a checkbook. The main function needs to get the initial balance, the amounts of deposits, and
Irina18 [472]

Answer:

def deposit(deposit_amount, balance):

   balance += deposit_amount

   return balance;

def process_check(check_amount, balance):

   balance -= check_amount

   return balance;

balance = float(input("Enter the initial balance: "))

transaction = input("Choose transaction method - D to deposit, C to process check, Q to quit: ")

while transaction != 'Q':

   if transaction == 'D':

       deposit_amount = float(input("Enter amount to be deposited: "))

       balance = deposit(deposit_amount, balance)

       print("Current balance is: " + str(balance))

   elif transaction == 'C':

       check_amount = float(input("Enter amount to process check: "))

       if balance >= check_amount:

           balance = process_check(check_amount, balance)

           print("Current balance is: " + str(balance))

       else:

           print("Not enough money!")

   else:

       print("Invalid input!")

   transaction = input("Choose transaction method - D to deposit, C to process the check, Q to quit: ")

print("Your final balance is: " + str(balance))

Explanation:

- Create functions to handle deposits and checks

- Ask the user for the initial balance and transaction to be made

- Initialize a while loop iterates until the user enter Q

- Ask the deposit amount or check amount depending on the transaction chosen

- Calculate and print the current balance for each transaction

- Print the final balance

5 0
3 years ago
A trench is a narrow excavation in which the depth is greater than the width and the width does not exceed 15 feet. A. False B.
Arturiano [62]
I think it is false
4 0
4 years ago
Read 2 more answers
Match the feature to its function.
Roman55 [17]

The Matchup of the feature to its function are:

1. Normal view the place where creating and editing occurs .

2. Notes view an area in which information for handouts can be added.  

3. Slide pane the place where the slide order can be changed.

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks.

<h3>What is the normal view?</h3>

Normal view is known to be the view that is seen or used in editing mode and this is where a person can work a lot of items so that they can create their slides.

Note that Normal view is one that shows slide thumbnails on the left, that is a large window that depicts the current slide, and also has a  section that is often seen below the current slide.

The Matchup of the feature to its function are:

1. Normal view the place where creating and editing occurs .

2. Notes view an area in which information for handouts can be added.  

3. Slide pane the place where the slide order can be changed.

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks.

Learn more about Normal View from

brainly.com/question/14596820

#SPJ1

6 0
2 years ago
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
Write an application that solicits and inputs three integers from the user and then displays the sum, average, product, smallest
Oksana_A [137]

Answer:

Please find below program

Explanation:

import java.util.Scanner;

public class Tester {

public static void main(String[] args) {

 

 // create an object of scanner class

 Scanner scanner  = new Scanner(System.in);

 

 //prompt user to enter first number

 System.out.println("Enter first integer: ");

 

 // read value from entered by user and keep it in num1

 int num1 = scanner.nextInt();

 

 //prompt user to enter second number

 System.out.println("Enter second integer: ");

 

 // read value from entered by user and keep it in num2

 int num2 = scanner.nextInt();

 

 //prompt user to enter third number

 System.out.println("Enter third integer: ");

 

 // read value from entered by user and keep it in num3

 int num3 = scanner.nextInt();

 //close scanner as we have done with user input

 scanner.close();

 

 //calculate sum

 int sum = num1+num2+num3;

 

 //calculate average

 int average = sum/3;

 

 //calculate product

 int product = num1*num2*num3;

 

 //find out largest number

 int largest = 0;

 if (num1>=num2){

  if(num1>=num3)

   largest = num1;

  else

   largest = num3;

 }else {

  if(num2>=num3)

   largest = num2;

  else

   largest = num3;

 }

 

 // find out smallest number

 int smallest = 0;

 if (num1<=num2){

  if(num1<=num3)

   smallest = num1;

  else

   smallest = num3;

 }else {

  if(num2<=num3)

   smallest = num2;

  else

   smallest = num3;

 }

 

 // print all the information

 System.out.println("Sum of three numbers : "+sum);

 System.out.println("Product of three numbers : "+product);

 System.out.println("Average of three numbers : "+average);

 System.out.println("Smallest number : "+smallest);

 System.out.println("Largest number : "+largest);

}

}

3 0
4 years ago
Other questions:
  • How do computers use input and output to get and give the information that they need to solve problems?
    10·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Which of the items listed is not considered to be personal protective equipment (PPE)?
    14·1 answer
  • Is Filmora 9 or Final Cut Pro Better for personal use?
    12·1 answer
  • What do you mean by hardware and software?<br>​
    12·2 answers
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
  • Complete each of the following sentences by
    10·2 answers
  • Please answer........
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!