ASCII values range from ____.

A. 0 to 512
B. 0 to 255
C. 1 - 26
D. 1 - 128


Answer: B

Computer Science & Information Technology

You might also like to view...

A program's main module occupies a designated place in memory called the ____.

A. branch B. stub C. stack D. base

Computer Science & Information Technology

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

A. Network router B. Personal firewall C. Hardware that uses NAT (network address translation) D. All of the above

Computer Science & Information Technology

As part of the risk identification process, listing the assets in order of importance can be achieved by using a weighted __________ worksheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The special character that can be used with an identifier is ____.

A. - B. _ C. * D. #

Computer Science & Information Technology