1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
3 years ago
7

Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.

Computers and Technology
1 answer:
kumpel [21]3 years ago
8 0

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\  2 & 17 & 1 \\   2 & 8 & 0  \\ 2 & 4 & 0  \\ 2 & 2 & 0   \\ 2 & 1 & 1\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\  2 & 1 & 1 \\  \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\  2 & 13 & 1 \\   2 & 6 & 0  \\ 2 & 3 & 1  \\ 2 & 1 & 1   \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\  2 & 8 & 0 \\   2 & 4 & 0  \\ 2 & 2 & 0  \\ 2 & 1 & 1   \\\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = <em>100011</em>

B) 3 = <em>11</em>

C) 27 = <em>11011</em>

D) 16 = <em>10000</em>

You might be interested in
Microsoft word's spell checker
natka813 [3]
A, will also check word usage
7 0
3 years ago
Read 2 more answers
A use case description is the best place to start for the design of the forms for a user interface.​ True False
Veronika [31]

Answer:

false

Explanation:

6 0
3 years ago
What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
Phoenix [80]

Answer:The kernel provisions hardware resources to meet software requirements.

Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.

Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.

Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.

3 0
3 years ago
Which of the following is an object-oriented language?
faltersainse [42]

Answer:

C++

Explanation:

Significant object-oriented languages include: (list order based on TIOBE index) Java, C++, C#, Python, R, PHP, Visual Basic.NET, JavaScript, Ruby, Perl, Object Pascal, Objective-C, Dart, Swift, Scala, Kotlin, Common Lisp, MATLAB, and Smalltalk.

8 0
2 years ago
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web
Zielflug [23.3K]

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

8 0
3 years ago
Other questions:
  • Write an efficient C++ function that takes any integer value i and returns 2^i ,as a long value. Your function should not multip
    13·1 answer
  • Write the function "zipper". the function will take two array/list/table parameters and return a new array/list/table which will
    15·1 answer
  • As a photographer, what will be the driving force behind everything that you produce?
    13·1 answer
  • . double x = 5; declares that x is a...............variable.
    14·1 answer
  • Eric would like to have a color textbook that makes it look as if the character in an image is speaking. Which object should he
    14·1 answer
  • What is the Most popular game out today?
    6·2 answers
  • What happens to a mechanical system when two opposing torques do not cancel out?
    7·1 answer
  • A thermostat with the processor program to control temperature is an example of what kind of computer
    6·1 answer
  • Es costoso construir un robot
    6·1 answer
  • What are some signs that could help you determine that a date and time was inserted as a special object instead of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!