1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
4 years ago
8

Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp

lain its conversion to decimal number 59 which formula will Samuel use to explain conversion
Computers and Technology
1 answer:
Bond [772]4 years ago
6 0

The answer would be to multiply the binary code with all results from the formula Samuel used to encode the desired number, until he gets 59 as a result.

(P.s. 111011 isn't 59, it results in a semicolon if you convert it using an binary code translator. It rather states that 00110101 00111001 is 59)

You might be interested in
What are the importance of switches in our electron device
MissTica

Electric switches are very important because all the equipment we are using is useless without a switch.

4 0
4 years ago
TWO MINUTES LEFT<br> ________ __________ is the physical arrangement of devices on a network.
coldgirl [10]
A database? I'm not entirely sure, but i think it is called a database.
7 0
3 years ago
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th
balu736 [363]

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

4 0
3 years ago
Answering a questi
irina1246 [14]

Answer:

character

Which word (s) best describe personality. character

4 0
3 years ago
Which is the last step to creating a community garden
pentagon [3]

Answer:

construct the garden

Explanation:

step 1. survey the property

step 2. test the soil

step 3. clean contaminants

step 4. consider garden design

step 5. construct the garden

7 0
3 years ago
Other questions:
  • The ____ operator eliminates duplicate values in the results of a query.
    11·1 answer
  • Match the items with their respective descriptions. denotes row numbers denotes cell addresses denotes worksheets denotes column
    10·1 answer
  • CB workorder
    6·1 answer
  • I NEED IT NOWW
    13·2 answers
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
    13·2 answers
  • Why does a computer need an operating system?<br><br> ​
    10·1 answer
  • When you are hired to develop a system for an organization. Is it important to follow all the requests/wants of the system owner
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!