1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
4 years ago
6

There is a simple pattern for determining if a binary number is odd. What is it and why does this pattern occur

Computers and Technology
2 answers:
kramer4 years ago
8 0
The rightmost digit is the one's digit ( 2^0 ). If it's set, the number is odd, else it's even.
andrew-mc [135]4 years ago
6 0

The answer to this question would be the least number (right most number). If the last digit of a binary number is 1, the number is odd; if it’s 0, the number is even.  If you add an even number with even number, the result should be even. But if there is just one odd number added, it will be odd. In binary, all the number is multiplied by 2x. It is pretty clear that all the number should be even beside the first/lowest multiplier   which has potential to be 1.  Everything about the binary number system is the same as the decimal number system with just one difference: the base is 2 instead of 10.

Further Explanation:-

Binary number system

Binary means base 2(note the prefix bi). Base 2 (binary) has 2 digits: 0, 1. since binary numbers are made up of binary digits, we often call a binary digit a bit (short for binary digit). We may also refer to a place value position as a bit. In other words, the binary number '1010' requires 4 bits to write, and those bits are '1', '0', '1' and '0'.For any number system that has a base b, the first b non-negative numbers are represented by the digits themselves. For base b=2 (binary), the first 2 numbers are 0 and 1.Counting in binary is just like counting in decimal, except that you run out of digits much more quickly and have to resort to more value places sooner. To count the number of eggs in a dozen in binary would be as follows: 0, 1, 10, 11, 100, 101, 110, 111, 1000, 1001, 1010, 1011, 1100.  

Example:  

1101 represents an odd number (13); 10010 represents an even number (18).  To convert a binary number to base 2k , split it into groups of k digits (adding leading 0s if necessary), then convert each group to base 2k . Ex: Convert the number 1001011111 to base 8. First, note that 8 = 23 , so we should split the number into groups of 3 digits: 001 001 011 111 Note that we added two leading 0s to make the number of digits a multiple of 3. Next, we convert each group of 3 digits to base 8: 001 001 011 111 1 1 3 7 Thus, the number in base 8 is 1137.

Learn more:

  • What is the binary answer to the binary number 100 added to the binary number 11?

         brainly.com/question/6561005

Keywords:  binary, number system, decimal, conversion, even binary number, odd binary.

You might be interested in
. What physical characteristic does a retinal scan biometric device measure?
elena-s [515]

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

4 0
4 years ago
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
ira [324]
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

4 0
3 years ago
Programmers use an Integrated Development Environment (IDE) to write software programs, because:
Natali [406]

Answer:

A) It simplifies the process by providing a single user interface for multiple software tools.

Explanation:

6 0
3 years ago
Wardrobe engineering is important because
levacccp [35]

Answer:

The answer is "Option d"

Explanation:

The wardrobe engineering consists of choosing clothes that are so simple in design and better in the style that they are acceptable to the existing show-up and perfect for the future years. This design Originally coined Dressing for Confidence author John Molloy, which describe that clothes and accessories can also be used to create a certain picture, and wrong choices can be described as follows:

  • In option a, It's right, that we know about current fashions, but selecting suitable career apparel is not important, that's why it is incorrect.
  • In option b, It is wrong because whatever you wear is not to make choices of any sort.
  • In option c, It is wrong because it can't provide promotion.

3 0
3 years ago
Which of the following protocols allows seemingly ill-matched computers to communicate with one another?
hodyreva [135]

Answer:

HTTP

Explanation:

HTTP is Hyper Text Transfer Protocol. This protocol is used to provide connection between server and client that are not connected or ill-matched. When a client request to the website. this address facilitate the client to connect with the server that is not directly connected to the client computer.

As we know, every website address starts with http/:  

5 0
3 years ago
Other questions:
  • An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
    7·1 answer
  • Which of the following characters at the beginning of a cell signifies to Excel that it should perform a calculation for the val
    13·1 answer
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • Approximately what percent of desktop PCs are used for work-related purposes?
    13·2 answers
  • The "Rudolph Rule" is best described by which of the following?
    9·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Write a program that allows the user to enter a time in seconds and then outputs how far an object would drop if it is in free f
    7·1 answer
  • Which of the following is an example of a content management system (CMS)?
    12·2 answers
  • Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t
    14·1 answer
  • The phrase ________ refers to data that is inaccurate, incomplete, or erroneous.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!