1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
10

Describe how place value is used in the binary number system. How is it similar or different from the way place value is used in

the base 10 number system?
Computers and Technology
1 answer:
daser333 [38]3 years ago
7 0
The binary number system is also referred as base-2 numeral system. The numeric values in the binary system are represented with only two symbols "0" and "1". The base 10 number system on the other hand is the usual number system that uses decimal numbers.
In the binary system the number to the left of the point is a whole number and every number further left gets 2 times bigger. The first digit on the right means halves and every number further right is 2 times smaller.
In the base 10 system number greater than 1 appear to the left of a decimal point. Values that are a fraction appear to the right of the decimal point. Every number further  left is 10 times bigger, and right 10 times smaller.







You might be interested in
Write an application that displays appropriate prompts to the user and reads a person
vfiekz [6]

Answer:

The program to this question can be given as:

Program:

import java.util.*; //import package  

public class Person_detail //define class

{

public static void main(String ar[]) //define main function

{

String Name,hobby,dream_Job; //declare variable.

int age;

Scanner sc = new Scanner(System.in); //creating Scanner class object for user input.

System.out.print("Enter Your Name : "); //message  

name = sc.next(); //user input

System.out.print("Enter Your Age : ");

age = sc.nextInt();

System.out.print("Enter Your hobby: ");

hobby = sc.next();

System.out.print("Enter Your aim: ");

aim = sc.next();

//print values.

System.out.println("Hello, my name is "+name+" and I am "+age);

System.out.println("years old.My hobby is playing "+hobby+".");

System.out.println("I want to be a "+aim+" when I grow up!");

}

}

Output:

Hello, my name is XXX and I am 21

years old.My hobby is playing cricket .

I want to be a cricketer when I grow up!.

Explanation:

In the above program firstly we import the package for user input. Then we declare a class that is Person_detail. In this class, we declare the main function. In the main function, we declare a variable that is name, hobby, aim, and age. In these variable first 3 variables datatype is string and age variable data type in integer. Then we create a scanner class object and take input from the user and print it into a paragraph.

3 0
3 years ago
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
A self improvement plan should begin with planning how you will accomplish your goal.
Artist 52 [7]

Answer:

True

Explanation: The first step is to make a goal. The second step is to plan how you will accomplish you goal. The third and final step is to accomplish your goal.

4 0
3 years ago
Read 2 more answers
Until the 1990s scaling up was almost always a more cost-effective strategy to increase available computer power because communi
salantis [7]

Answer:

The answer is "Option A"

Explanation:

A single computer component also known as a single-board computer, it is a total machine, which is built on a single silicon chip with functional devices like microcontroller, (I / O), and storage.  

  • It normally uses a device, which has a fanless, small-power computation system, and small-profile design.
  • This model provides very slow communication between the components of single computers, that's why the given statement is true.

8 0
4 years ago
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
3 years ago
Other questions:
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • Use System.DateTime along with System.Console to implement a simple C# program that does the following:_______.
    5·1 answer
  • Which of these files when included in a program will provide user assistance?
    13·2 answers
  • What does the shell of an operating system do
    14·1 answer
  • Write a function in Java that implements the following logic: Given a string and an int n, return a string made of n repetitions
    15·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • Debug the following program.
    5·1 answer
  • How do you open an application on the macOS?
    11·2 answers
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!