1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
2 years ago
4

Convert the bianary (base-10) number 20 to decimal (base-2)

Computers and Technology
1 answer:
devlian [24]2 years ago
7 0

Converting the binary (base-10) number 20 to decimal (base-2) gives 10100.

<h3>What is binary encoding?</h3>

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

In Computer programming, two's complement of base-10 is generally easier to implement because it has a single representation of 0 only.

<h3>How to convert a binary (base-10) to decimal (base-2)?</h3>

2 | 20

2 | 10 R 0

2 | 5 R 0

2 | 2 R 1

2 | 1 R 0

2 | 0 R 1

Next, you would read the decimal number (base-2) upward and this gives:

20₂ = 10100.

Read more on binary encoding here: brainly.com/question/13100118

#SPJ1

You might be interested in
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
In which order do the DHCP messages occur when a client and server are negotiating address configuration?
Leona [35]
One two three and four
8 0
3 years ago
Discuss data and its types from computer programming and data analysis prospectively?​
Hoochie [10]

Answer:

With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.

3 0
3 years ago
This innovator created “honeypots” in which fake accounts are set-up in order to catch cyber criminals.
statuscvo [17]

Answer: A

Explanation:

3 0
4 years ago
Read 2 more answers
The graphic shows a cause and effect organizational aid.
nika2105 [10]

Answer:

gets good grades

3 0
3 years ago
Other questions:
  • Taylor has spent a lot of time developing and setting up his presentation. He wants to make sure his delivery is as good as poss
    8·2 answers
  • At what point in a vulnerability assessment would an attack tree be utilized?
    9·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    15·1 answer
  • On a computer with two or more cpus, ____ is a technique in which each processor or core works on a different job.
    15·1 answer
  • During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement acti
    5·1 answer
  • ????????????????????????????????
    5·1 answer
  • A data table is a range that displays what?
    15·2 answers
  • Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin
    13·1 answer
  • When creating an html document, what do we use to set aside space for content?.
    13·1 answer
  • Which addresses represent valid local loopback addresses? check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!