1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
13

What is eight bits of data called?

Computers and Technology
1 answer:
kirza4 [7]3 years ago
4 0

8 bits: octet, commonly also called byte.

You might be interested in
Why is technology potentially important to the banking industry? What consumer needs does it fulfill?
Alexxandr [17]
Accuracy
Speed
Security
6 0
3 years ago
Given a link with a maximum transmission rate of 11.7 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
My name is Ann [436]

Missing Details of Question

Statistical multiplexing is used, with details as follows o

- Packet Payload Size = 1000 Bytes

- Packet Header Size = 24 Bytes (overhead)

- Ignore Processing and Queueing delays

- Assume partial packets (packets consisting of less than 1000 Bytes of data) are padded so that they are the same size as full packets.

- Assume continuous alternating-packet transmission.

Answer:

Time = 10.47

Explanation:

Given

Initial Time, t = 0

File X = 14MiB = 14 * 1024 * 1024 = 14,680,064 bytes

File Y = 272KiB = 272 * 1024 = 278528 bytes

Transmission Rate = 11.7Mbps

Total Packet Length is calculated as (1024 * 8)/(11.7Mbps)

Total Packet Length = 8192 ÷ 11700

Total Packet Length = 0.700171 ms/packets

Number of packets

File X = 14,680,064 bytes ÷ 1000 bytes

File X = 14,680.064

File X = 14,680 ---- Approximated

File Y = 278528 bytes ÷ 1000 bytes

File Y = 278.528

File Y = 279 ------- Approximated

Number of Packets = 279 + 14,680

= 14959 packets

The implication of the above is that, File X after a total of 20202 packets are transmitted

File Y will finish transmitting at:

14959 * 0.700171

= 10473.86 ms

= 10.47386 s

= 10.47 s

3 0
3 years ago
What is the code for loading image in matlab
MA_775_DIABLO [31]

Answer: Using imread command

Explanation:

For loading images in matlab we can use the imread command. Some example regarding how to use the code is as follows:

A = imread('ball.tif');

Here suppose the image file name is saved as ball and is in tif format. Here the image is stored in an array named A.

We can view the image using

imshow(A);

7 0
4 years ago
AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
tigry1 [53]

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

<h3>What is AUP?</h3>

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

<h3>How does an AUP regulates users?</h3>

Most AUPs imply:

  • Users can only access certain sites and dowloading specific content is forbidden.
  • The access to the internet or network cannot be used for criminal purposes.
  • Only authorized users can connect to the corporate network.

Learn more about AUP in: brainly.com/question/9509517

#SPJ1

8 0
2 years ago
Hiding data within pictures, audio, or video files can be difficult to detect and find. What can be done to reduce this?
DIA [1.3K]

Answer:

The hiding of the information/data in the images ,videos and audio is referred as stenography This can reduced by taking several steps like:-

  • Extraction method is the widely used method for the separation and picking out the data and the image or other data forms from each other.
  • Hue and saturation method works on the images and audios that  can find the hidden data.
  • Image processing is doen on the image which enhances the form of it by extraction of the unnecessary data from it.

5 0
3 years ago
Other questions:
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Negative methods of behavior correction include all but this:
    9·1 answer
  • You can use______ in order to allow the user to browse and find a file at run time.
    15·1 answer
  • A printer would be considered _____. Select 2 options. 1 an input device 2 an output device 3 hardware 4 software 5 storage
    10·1 answer
  • Do You assign the Needs Met rating before assigning the page quality (PQ) rating?
    11·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!