There are __________ bits in a byte.

a. 4
b. 8
c. 16
d. 32


b. 8

Computer Science & Information Technology

You might also like to view...

What must be done to a temporary site to associate a domain of your choice with the site?

What will be an ideal response?

Computer Science & Information Technology

The ____________________ attribute is used to merge cells across rows.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Encryption is more than simple password protection–it prevents users from ________

A) deleting the file B) saving the file C) editing the file D) opening the file

Computer Science & Information Technology

How many host IDs does a /20 network support?

A. 1,048,574 (220 ? 2) B. 65,536 (216) C. 4094 (212 ? 2) D. 64 (26)

Computer Science & Information Technology