1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
6

Why would you convert your birth year to binary numbers?

Computers and Technology
1 answer:
I am Lyosha [343]3 years ago
6 0

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

You might be interested in
Long-term memory used by the computer:
Fynjy0 [20]
The long term memory used by the computer is called “RAM”
6 0
3 years ago
Read 2 more answers
Why is it important to ground both computers and network devices?
julia-pushkina [17]

Answer:

Ground the electrical equiptment so no power surges come through and fry the equiptment if there is a storm etc.

Explanation:

4 0
2 years ago
The number of output for a decoder if the input is 4
WINSTONCH [101]
To get the number ot decoder output:

2^n; where n is number of input
2^4
2 × 2 × 2 × 2 = 16 outputs

3 0
3 years ago
Select the correct answer. What property do you use to retrieve the selected option from a list box? A. selectedIndex B. selecte
sertanlavr [38]
The answer is A.selectedIndex
4 0
3 years ago
Read 2 more answers
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
Other questions:
  • Laurence Sims owns a football team that plays its home games in City Stadium. To increase revenue, he is offering a sponsorship
    14·1 answer
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • A Ground Fault Circuit Interrupter (GFCI) works by comparing the amount of current going to and returning from equipment along t
    10·2 answers
  • A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be spe
    7·1 answer
  • If there is only a stop sign posted at a railroad
    9·1 answer
  • Cuáles son las partes más importantes de una flor​
    7·1 answer
  • Write a structure declaration to hold the following data about a savings account: Account Number (string object) Account Balance
    8·1 answer
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • In which of the following movies, multimedia's special effect is used ? *
    8·2 answers
  • the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!