ASCII requires only _____ bits to represent each characters.

A. 5
B. 6
C. 7
D. 8


Answer: C

Computer Science & Information Technology

You might also like to view...

What environmental elements could you modify to increase the difficulty of your game?

What will be an ideal response?

Computer Science & Information Technology

Does the Bureau of Labor Statistics offer any comments or insights into the subject of outsourcing generally? What conclusions does it reach?

What will be an ideal response?

Computer Science & Information Technology

When you create an exception, it is conventional to end its name with ____.

A. EClass B. Exception C. Error D. Exc

Computer Science & Information Technology

Which of the following best describes the concept of a DMZ when using firewalls?

A) This is the zone inside the proprietary network. B) This is the zone outside the proprietary network. C) This is a zone within the proprietary network that needs access from outside the proprietary network. D) This is a zone outside the proprietary network that needs access from inside the proprietary network.

Computer Science & Information Technology