1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
2 years ago
15

If “A” represents in binary 10011001, what will be the value of word “CAB”?

Computers and Technology
1 answer:
yawa3891 [41]2 years ago
3 0

Answer:

01000011 01000001 01000010

Explanation:

You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.

You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
3 years ago
Consider that the following variables have been declared: int David_Tennant; double Matt_Smith; Which of the following statement
earnstyle [38]

Answer:

Double eleventh = 11.50;

David_Tennant = eleventh.intValue();

Explanation:

These two statements are correct. Method intValue() converts Integer to int which is is called unboxing. In this case intValue() method converting Integert part of eleventh variable then storing it in int variable David_Tennant. Output will be 11.

8 0
3 years ago
What do computers use to represent on and off? 0 and 1 1 and 2 RGB Megabyte
rosijanka [135]
We use 0 to represent "off" and 1 to represent "on". Each one of the switches is a bit. A computer is called a "64-bit" computer if its registers are 64-bits long (loosely speaking). Eight switches in a row is a byte.
7 0
2 years ago
You are building a system for a Housing Society, such as Bahria Town. You are supposed to design a very
Rudiy27

Answer:

122e²edafetejtjthrhhrhehegegegritirutu5oydodyo6ifyifi5did5i5isi5itirusritursududtustudidtidtiisisus5us5ususrursusududtidtidtidudtidtidtidtidtursustusriruausrysrysysrusrus4sus4us4y4as4us4us4us4us4ys4u5su5su

Explanation:

tiyrygtghyyhhgghghhghnghgmjfhfhhrzjjxtxthxthxthztjtjtdjstjdtjztjztjztjtzjzhzxhztzthzrhztuzthhuthhtxxfhzthzthzttuhzthtzjztuzztuztutuztfhruryryryegegrhrhrhrhrhgfhdhdhdhdhfddhdhhfhfhjfhfhfhfhdhdhddhdhjdhjff

6 0
2 years ago
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Other questions:
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • _______ data would be useful for creating a weekly status report for your manager that should reflect changes in real time.     
    10·2 answers
  • Should a waiting thread receive priority over a thread first attempting to enter a monitor? What priority scheme, if any, should
    9·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • Write a C++ programthat reads in the side of a square and prints out a pattern on$
    13·1 answer
  • Mrs. Dunn shows her students a data range, which has been named "Goals," covering cells A14 to A25. She tells her students that
    15·1 answer
  • What is the practice of distributing responsibility among multiple people so that no one person has full control of
    11·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • The Power of If Worksheet
    13·2 answers
  • You are configuring a network attached storage (nas) appliance. what file sharing protocol(s) could you use to allow access to w
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!