1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
9

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 1

00 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?
A 5
B 6
C 7
D 8
Computers and Technology
1 answer:
fenix001 [56]3 years ago
6 0

Answer: I believe the answer is: A, 5.

Explanation:

You might be interested in
The accounting department moved its network-attached printer from one side of the office to a more centralized location, making
Blababa [14]

Answer:

The cable run connecting the new keystone jack to the patch panel is bad.

The patch panel connector for the new location's cable run is not connected to a switch.

Explanation:

The cable run connecting the new keystone jack to the patch panel is bad.

The patch panel connector for the new location's cable run is not connected to a switch.

5 0
3 years ago
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
3 years ago
Guys Do you know about e-waste recycling well ?
TEA [102]
<span>E-waste is a popular name for elecronics at the end of their "useful life".. computers, tv, steros, copiers, and fax mations are some common products. many of them can be reused, refurbished, or recycled. 
</span>
4 0
3 years ago
Read 2 more answers
Which vendor did IBM select to create the operating system for the IBM PC?
schepotkina [342]
The Answer Is: "Microsoft".
7 0
3 years ago
Good business ethics is a good marketing strategy. Discuss
Arada [10]
Good business ethics are the key to good marketing and success. Ethics portray whether an individual has good judgment, intelligence, and many more things that are essential to business. Without good ethics business as a whole would be ruthless. Some business ethics are even required by the law in some places and there are rules and regulation to trade. 

Hope that answered your question!
6 0
3 years ago
Other questions:
  • Describe five different ways databases can be processed
    14·1 answer
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Describe the functions of a system software​
    6·2 answers
  • Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g
    9·1 answer
  • What are the different types of application architecture
    5·1 answer
  • When we code an algorithm, we need to provide the commands in the order we want the
    10·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • One last question
    7·2 answers
  • Read-only memory chips are used to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!