answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
2 years ago
4

While only 7 bits are needed per ASCII code, most computers use 8 bits per ASCII code. If an email message has 500 characters, h

ow many bits would a computer use to store that email, using 8 bits per ASCII code
Computers and Technology
1 answer:
Law Incorporation [45]2 years ago
7 0

If an email message has 500 characters, computer would use 7 bits to store that email.

<u>Explanation:</u>

The basic ASCII set uses 7 bits for each character. This gives each character a total of 128 unique symbols. But the extended ASCII character set uses 8 bits. Because of this, there is an additional 128 characters.

The extra character that is present in the 8 bits extended ASCII character has characters from foreign languages and special symbols and characters which can be used to draw images and pictures.

You might be interested in
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
Choose the correct sequence for classifier building from the following.
Alekssandra [29.7K]

Answer:

b

Explanation:

First, we need to initialize the classifier.

Then, we are required to train the classifier.

The next step is to predict the target.

And finally, we need to evaluate the classifier model.

You will find different algorithms for solving the classification problem. Some of them are like  decision tree classification  etc.

However, you need to know how these classifier works.  And its explained before:

You need  to initialize the classifier at first.

All kinds of classifiers in the scikit-learn make use of the method fit(x,y) for fitting the model or the training for the given training set in level y.

The predict(x) returns the y which is the predicted label.And this is prediction.

For evaluating the classifier model- the score(x,y) gives back the certain score for a mentioned test data x as well as the test label y.

8 0
2 years ago
Which of the following statements does not contain an error?
Drupady [299]
III is correct .... esc code use \
3 0
2 years ago
Jupiter Inc., a software firm, is starting to face competition from the new entrant in its market, Coral Inc. Jupiter wants to p
Scilla [17]

Answer:

A.

Explanation:

Based on the information provided within the question it can be said that in this scenario, Jupiter's best move would be to adopt the measure of ensuring that customers find its software simpler and more convenient to use than that of Coral. This would create satisfaction among the customers which in term would lead to customer loyalty.

8 0
2 years ago
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
Svetllana [295]

Answer:

SATA Cable

Explanation:

SATA (Serial Advanced Technology Attachment) Cable is a connection made between Computer hard drives and the motherboard. When a computer gives an error on startup that OS not found, there's a possibility that the drive containing the OS is not well connected to the motherboard. Making sure it is well connected to the motherboard will possibly fix the issue.

6 0
2 years ago
Other questions:
  • 5. You just bought a new hard drive for youYou plan to use this as a secondary hard drive to store allcomputeryour UMA files. On
    8·1 answer
  • What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
    14·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • Polygon transform (25 points). Write a library of static methods that performs various geometric transforms on polygons. Mathema
    12·1 answer
  • Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
    14·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory
    15·1 answer
  • A data analyst is using the Color tool in Tableau to apply a color scheme to a data visualization. They want the visualization t
    13·1 answer
  • Select the described workplace culture from the drop-down menu.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!