1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
14

How many bits and bytes are occupied by six long variables​

Computers and Technology
1 answer:
Flura [38]3 years ago
4 0

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

You might be interested in
What department is cyber security
Paul [167]

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

8 0
3 years ago
Read 2 more answers
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
Anna35 [415]

Answer:

Following are the steps with actions that are involved in required to perform a packet transfer.

Explanation:

  • Step 1: The host sends a connection request to server which is at IP address 209.165.200.254
  • Step 2: R1 check the configuration of NAT to inquire weather the packet should be translated or not.
  • Step 3: If there is no entry found for translation of given IP address, It is assumed that the IP address 192.168.10.10  will be translated already.
  • Step 4: R1 selects a global address  from the dynamic address pool that is available to it.
  • Step 5: R1 replaces the given IP address 192.168.10.10  with the translated inside global address.

i hope it will help you!

5 0
3 years ago
Because one memory location can be used repeatedly with different values, you can write program instructions once and then use t
CaHeK987 [17]

Answer:

True.

Explanation:

The statement written in the question is True.We can use one memory location and use it with different values.

For example:- When we are using a loop be it for,while or do-while.The counter that we use for iteration is one and we use that counter to run the loop.We are using a single memory location and we are updating the count in that memory location many times.

for(int i=0;i<1000;i++)

{

     //body.

}

We are using i's memory location and changing it 1000 times.

3 0
3 years ago
Which of the following is true of functions?
SVETLANKA909090 [29]

Answer:

only D.

Explanation:

A is false because you can only declare it once, then call it multiple times.

B is false does not affect the number of commands. You can expect that the function commands are run multiple times.

C is false because the amount of work the program has to do does not change.

D is spot on.

3 0
3 years ago
What can web designers use to control the individual web page layouts for all of the pages on a website?
Lyrx [107]
You need to have a redirect link to each page on your homepage. So you have a better and simple navigation on your webpage. Every webpage should have a homepage, so that every person who visits, knows where to go back to.

4 0
4 years ago
Other questions:
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
    9·2 answers
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • Using complete sentences post a detailed response to the following.
    9·1 answer
  • Computer father known as​
    5·1 answer
  • 2 4. What is one way to prepare for building a project budget? (1 point)​
    9·1 answer
  • ....................
    5·1 answer
  • 1 Which of the following could work as bits for a binary system?
    9·1 answer
  • What is a key differentiator of Conversational Artificial Intelligence (AI)
    11·1 answer
  • What type is the combination of an integer and a string
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!