1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
10

Explain the consequences of using bits to represent data.

Computers and Technology
1 answer:
neonofarm [45]3 years ago
7 0

Answer:

Each description of a PC needs to clarify how the PC handles data: numbers, text, pictures, sound, films, directions.

Using bits to represent data implies that the computer has to use a lot of memory since every character has a group of bits representing it.

The PC is an electronic gadget. Every one of its wires can either convey electric flow or... not convey current. Thus, similar to a light switch, it sees just two states. Incidentally, this is sufficient to make the entire thought work. Indeed, any framework that can speak to in any event two states can speak to data. Take, for instance, the Morse code that is utilized in telecommunication. Morse is a sound transmission framework that can convey a short signal (spoke to by a dab) and a long beeeeeep (spoke to by a scramble). Any letter or number can be spoken to by a mix of these two images. Snap here to see a Morse interpreter.

Explanation:

Essentially with PCs. To speak to a number, we utilize the parallel number-crunching framework, not the decimal number framework that we use in regular day to day existence. In the double framework, any number can be spoken to utilizing just two images, 0 and 1. (Morse is nearly, yet not exactly (because of the delays between letters) a paired framework. A framework firmly identified with Morse is utilized by PCs to do information pressure (more about this later).

You might be interested in
Gold jewellery is made when solid-gold is melted and then put into containers which are the shape of the jewellery. After this t
Scilla [17]

Answer:

B

Explanation:

Self Explanatory - It is melted into a liquid then poured into a mold. It cools and becomes solid.

5 0
3 years ago
A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
AleksAgata [21]
A HAZARD EVALUATION by a design professional is used to determine the best system to provide the appropriate level and type of protection. Hazard evaluation involves systematic identification and analysis of hazards that are associated with a particular product or process. This gives one the opportunity to avoid these hazards.  
8 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
Leno4ka [110]

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

5 0
3 years ago
eocs can be fixed locations, temporary facilities, or virtual structures with staff participating remotely.
levacccp [35]

EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

<h3>What is the Emergency Operations Centers (EOC)?</h3>

Emergency Operations Centers is known to be part of the four NIMS Command and Coordination structures as the EOCs are known to be used  in an off site locations where staff are gotten from a lot of agencies that come together to address some imminent kind of threats and hazards.

Therefore saying that EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

Learn more about EOCS from

brainly.com/question/10794095

#SPJ1

5 0
2 years ago
Other questions:
  • What is the most effect way to include space after each paragraph
    14·1 answer
  • The logical view of a database system refers tohow a user or programmer conceptually organizes and understands the data. how the
    5·1 answer
  • Which of the following is NOT a good idea to do after you change the root password?
    12·1 answer
  • A supplier certification program: Group of answer choices
    9·1 answer
  • The operating system provides a ____, which is the means with which you interact with the computer
    5·1 answer
  • Who invented the speaker?
    14·2 answers
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • Create an online order form for a car rental store and include the following items: input text box to enter the number of days i
    14·1 answer
  • Having sound enhances your App, do you agree with this? Explain.
    9·1 answer
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!