After I type a character does it have it's own digital identity?

1 Answer

Answer :

answer:“a” is typically represented by the value 97 in the computer, this can be expressed as 61 in hex which is typically how computer scientists talk about these types of values. In binary it’s “0110 0001”. If you save the “a” to disk in the form of a file, then those binary bits are written into your storage location from memory, and if you quit the program then the memory that was holding those bits is flagged as available to the operating system and can be overwritten by other programs running. When you re-launch the program, it will probably have a function that get’s called at launch that will load in your saved file, and will allocate a chunk of memory to hold those bits. As far as erasing and replacing goes, it really depends on how the programer wrote the program. Typically, each keystroke (e.g. hitting the “a” key or the “delete” key) will activate a function that will extend the contents of the text box’s representation—called a string see this: http://en.wikipedia.org/wiki/String_(computer_science)#String_datatypes. Basically all text in a computer is like a long list of numbers with each number corresponding to a letter of the alphabet, symbol, or special characters (such as creating a new line). Here’s a list of the ASCII table which is an older system of representing letters as binary numbers, newer systems have been invented that take advantage of machines having much more memory, and allows for better handling of things like asian characters. UTF-8 is the preferred encoding these days.

Related questions

Description : A digital code attached to an electronic message to provide it unique identity is called ………… -Technology

Last Answer : A digital code attached to an electronic message to provide it unique identity is calleddigital signature.

Description : How was the problem of being modern without losing one’s identity was solved by the main character of Indulekha? -SST 10th

Last Answer : (i) The author of Malayalam novel Indulekha portrayed his protagonists Indulekha and Madhavan as English educated, smart, intelligent young people, who had good knowledge of Sanskrit too. (ii) The ... due to English education. So they used to hold onto their cultural tradition in various forms.

Description : Trademark is the registered ………………… depicting the identity of a product, work or company. -Technology

Last Answer : Trademark is the registered word or text/logo depicting the identity of a product, work or company.

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. diagonal elements are 1, the rest are 0. Replace all 0 to random number from 10 to 20 -Technology

Last Answer : import numpy as nparray1=np.identity(3)print(array1)x=np.where(array1==0)for i in x:array1[x]=np.random.randint(low=10,high=20)print(array1)

Description : Write a Numpy program to create a 3x3 identity matrix, i.e. non diagonal elements are 1, the rest are 0. Replace all 0 to random number from 1 to 10 -Technology

Last Answer : import numpy as npZ = np.arange(9).reshape(3,3)print (Z)x=np.where((Z%2)==0)for i in x:Z[x]=np.random.randint(low=10,high=20)print(Z)

Description : What do you mean by Identity theft? Explain with the help of an example. -Technology

Last Answer : Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to ... using the computer. He used Flex's email account to send inappropriate messages to his contacts.

Description : How To Protect Your Digital Identity?

Last Answer : With the rise in the population of using the internet raises, so do the security risks associated with it.Cyberthreats have turned out to be a major fear that countries have designated ... With the development of technology, there are various options to protect your identity and personal data.

Last Answer : : About 20,000 old trees in the Mount Tai area of Shandong Province in eastern China now have digital ID cards.

Description : What are plastic cards the size of a credit card that contains an embedded chief on which digital information can be stored? a) Customer relationship management system cards b) E-government identity cards c) FEDI cards d) Smart cards

Last Answer : d) Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : MIDI stands for: a) Memory in Digital Interface b) Musical Instructions and Digital Inteface c) Mouse Identity Development Interface d) Musical Instrument Digital Interface e) None of These

Last Answer : d) Musical Instrument Digital Interface

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following attribute should be unique? a) identity b) digital identity c) mashup d) all of the mentioned

Last Answer : digital identity

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : If, counter to your hopes, you got a second son instead of a daughter, would it be OK to turn the boy into a girl as long as the offspring has not formed its own identity?

Last Answer : No.

Description : What did gendering (or not) your kids teach you about your own gender identity?

Last Answer : I'm not sure I fully understand what you are asking but here goes. I try to teach my sons how to treat women with respect and kindness, because that is the way that I want to be treated. As a woman ... gender norms, or at least not nearly as many as I was raised with. Is that what you want to know?

Description : Trademarks relate to _______. A. Practice and knowledge acquired through experience B. The protection of proprietary information of commercial value C. The right to reproduce ones own original work D. Brand identity

Last Answer : D

Description : Memo data type allows you to store character type values in a table. -Technology

Last Answer : True Memo data type allows upto 65536 characters.

Description : The character based naming system by which server are identified is known as ……….. -Technology

Last Answer : The character based naming system by which server are identified is known asdomain name system.

Description : What does OCR stand for? (a) Optical Character Reader (b) Optical Character Recognition -Technology

Last Answer : (b) OCR stands for Optical Character Recognition used as an input device in a computer system.

Description : Optical Character Recognition (OCR) software allows the user to write in his/her normal handwriting. -Technology

Last Answer : FalseHandwriting recognition software allow the user to write in his/her normal handwriting.

Description : A special character can be defined as a short name given to a set of information. -Technology

Last Answer : True When a special character is used in an XML document, it expands to its full definition.

Description : To insert a symbol like © (copyright) you need to click on the special character option of the Insert tab. -Technology

Last Answer : True© is a special character which is added by Symbol option under Insert tab.

Description : The ………………. Animation enhance uses the flying effect on the text and character. -Technology

Last Answer : The CustomAnimation enhance uses the flying effect on the text and character.

Description : In __________ transmission, a unique SYNC character is transmitted at the beginning of each message. A. asynchronous B. synchronous C. digital D. analogue

Last Answer : B. synchronous

Description : Should I use the identity theft service provided after the Blue Cross/Excellus hack?

Last Answer : answer:Change all your passwords and IMO take a pass on Kroll . We have reviewed Identity Theft Shield and found that it offers solid identity theft recovery support for victims but takes no ... reviews of similar services below for our top-ranked alternatives: Link for review of ID Theft services

Description : Why do we say PIN number? effectively you are saying Personal identity number number. Now I just type my PIN in to the ATM machine? (Do you agree?)

Last Answer : Yes. You are correct sir. But if we said Pi number we may get a few tasty desserts instead

Description : Chordate identity card. How are they characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: protochordates (ascidians, amphioxus), vertebrates. Basic morphology: branchial clefts, notochord, neural tube. Type of symmetry: bilateral. Germ layers and coelom: ... in vertebrates. Types of reproduction: sexual, with or without larval stage. Fish Review

Description : Echinoderm identity card. How are echinoderms characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: sea cucumber, sea urchin, starfishes. Basic morphology: calcareous endoskeleton with spines, ambulacral system. Type of symmetry: secondary radial. Germ layers and ... cephalization. Types of reproduction: sexual, with larval stage. Phylum Chordata - Study Here

Description : Mollusc identity card. How are molluscs characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: snails, sea slugs, octopuses, squids, mussels, oysters. Basic morphology: soft body, with or without calcareous shell. Type of symmetry: bilateral. ... system: ganglial, advanced cephalization in cephalopods. Types of reproduction: sexual. Phylum Echinodermata Review

Description : Arthropod identity card. How are arthropods characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: cockroaches, flies, crabs, lobsters, shrimps, spiders, scorpions, mites. Basic morphology: segmented body (metameric), articulated limbs, chitinous exoskeleton, ... crustaceans, metamorphosis in some insects, no larval stage in arachnids. Phylum Mollusca Review

Description : Annelid Identity card. How are they characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: earthworms, leeches, lugworms. Basic morphology: cylindrical body, segmented (metameric). Type of symmetry: bilateral. Germ layers and coelom: triploblastics, ... ). Types of reproduction: sexual, with dioecious and monoecious beings. Phylum Arthopoda Review

Description : Nematode identity card. How are nematodes characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: ascaris, hookworms, filaria, pinworms. Basic morphology: cylindric (round) body, not segmented. Type of symmetry: bilateral. Germ layers and coelom: ... ganglial chord, primitive cephalization. Types of reproduction: sexual. Phylum Annelida - Q&A Review

Description : Platyhelminth identity card. How are platyhelminthes characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: planarias, schistosomes, taenias. Basic morphology: flat worm. Type of symmetry: bilateral. Germ layers and coelom: triploblastics, acoelomates. Digestive system: ... , beginning of cephalization. Types of reproduction: asexual and sexual. Phylum Nematoda Review

Description : Cnidarian identity card. How are they characterized according to examples of representing beings, basic morphology, type of symmetry, germ layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Examples of representing beings: jellyfish, corals, sea anemones, hydra. Basic morphology: polyp or medusa. Type of symmetry: radial. Germ layers and coelom: diploblastics, acoelomate. Digestive ... of reproduction: asexual and sexual with larval stage and metagenesis. Flatworms - Study Them Here

Description : Sponge identity card. How are sponges characterized according to example of representing beings, basic morphology, type of symmetry, embryonic (germ) layers and coelom, digestive system, respiratory system, circulatory system, excretory system, nervous system and types of reproduction?

Last Answer : Example of representing beings: sponges. Basic morphology: tubular or globular body with spongocoel, sessile; choanocytes, pinacocytes and amoebocytes. Type of symmetry: not established. Germ layers ... Types of reproduction: asexual and sexual with larval stage. Cnidarians - Questions and Answers

Description : What type identity thieves do with your identity? a) Apply for and use credit cardsb) Apply for loan c) Change their identity d) All of the above

Last Answer : d) All of the above

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Can digital radio communications be formatted to know whether a signal went through?

Last Answer : Most computers communicate with error-correction protocols that ensure that the signal received actually matches the signal sent. Some protocols (many Instant Messengers) have that feature built0in; when I ... at notification. For radios, it's technically possible, but unlikely to be implemented.

Description : As the digital age increases is old school paint to canvas or pen to paper artists going the way of the T-Rex?

Last Answer : That’s a different kind of talent than painting. I’m sure there are people who will still appreciate traditional painting throughout the years.

Description : How do I set up a digital voicemail system that could be converted to mp3's?

Last Answer : Google Voice. It meets all of your criteria. You don’t even need to convert to mp3 – it’s already in mp3 format.

Description : Technology-wise, how do digital rentals work?

Last Answer : Probably the item requires a license to be openable and the license expires after a certain period of time. It’s called digital rights and I’ve had a lot of music denied to me due to that.

Description : What, in your opinion, is the impact of digital download on individuals and organizations and society as a whole?

Last Answer : I think the impact is nothing but positive as the speed of important information distribution increases dramatically.

Description : Have any of you tried the "digital drugs" or "i-dosing?" What did you think of it? Does it work?

Last Answer : answer:It’s amazing what psychosomatics can do. No, it doesn’t work, not any more than the Skittles your 8th grade mate told you were ecstasy did. Any effect you get – it’s all in your head.

Description : Does anyone know how digital graffiti works?

Last Answer : No, I didn’t.

Description : Which digital tough camera or tough cam do you recommend?

Last Answer : Instead of shopping for an underwater camera for $300 which, all you will find are cheap disposables, buy an underwater case for your camera. Since you didn't say what camera you have now, I' ... //www.otterbox.com/ & here is another site that sells waterproof cases. http://www.waterproofcases.net/