There are __________ bits in a byte.
a. 4
b. 8
c. 16
d. 32
b. 8
Computer Science & Information Technology
You might also like to view...
What must be done to a temporary site to associate a domain of your choice with the site?
What will be an ideal response?
Computer Science & Information Technology
The ____________________ attribute is used to merge cells across rows.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Encryption is more than simple password protection–it prevents users from ________
A) deleting the file B) saving the file C) editing the file D) opening the file
Computer Science & Information Technology
How many host IDs does a /20 network support?
A. 1,048,574 (220 ? 2) B. 65,536 (216) C. 4094 (212 ? 2) D. 64 (26)
Computer Science & Information Technology