1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
11

What is character encoding?

Computers and Technology
1 answer:
andrew11 [14]3 years ago
4 0

Answer:   A character encoding provides a key to unlock (ie. crack) the code. It is a set of mappings between the bytes in the computer and the characters in the character set. Without the key, the data looks like garbage. The misleading term charset is often used to refer to what are in reality character encodings.

Explanation:

You might be interested in
The physical parts of the computer that you can see and touch are called______.
Tatiana [17]
Physical parts of computer: Computer Hardware
5 0
3 years ago
What scheme is usually used today for encoding signed integers?
dusya [7]

Answer:

 For encoding signed integer the two's complement scheme are used as, the number can be positive, with no fraction part and it can be negative. The computer can stored information in the form of bits and the value with the zero and one. Encoding of signed number in the two's complement with the positive integer it can be done by binary number.

6 0
3 years ago
Select three advantages of cloud computing.
Julli [10]

Answer:

A,B,and C

Explanation:

Hopefully this helps!

7 0
3 years ago
In Excel, an individual cell is the intersection of a row and a column.<br> True<br> False
Tom [10]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
What internal commands can we use when in interactive mode? can we use CLS and CD?
krok68 [10]
The cd command, also known as chdir (change directory), is a command-line shell command used to change the current working directory in various operating systems. It can be used in shell scripts and batch files.
3 0
3 years ago
Other questions:
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • When data are normalized, attributes in the table depend only on the secondary key?
    5·1 answer
  • How do you change the username on here?
    14·1 answer
  • Complete the statement below with the correct term.
    5·1 answer
  • The rules of thumb designers use when creating a wireframe page
    8·1 answer
  • What is the symbol for the relational operator 'equal to'?
    8·1 answer
  • Refer to the following statement: “We have implemented several IT solutions:
    14·1 answer
  • How does the View tab of the ribbon allow you to look at a document?
    9·1 answer
  • Your program should first save 10 random numbers from 1-100 to an array called aray
    12·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!