1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
4 years ago
14

Convert 192.16.3.1 to a Binary number

Computers and Technology
1 answer:
jenyasd209 [6]4 years ago
5 0
Converting a decimal number into binary would be:

192/2= 96   remainder=0  
96/2= 48    remainder=0
48/2=24     remainder=0
24/2=12      remainder=0
12/2=6        remainder=0
6/2=3         remainder=0
3/2=1          remainder=1
1/2= 0         remainder=1
The binary number would be: 11 00 00 00

For 16
16/2=8     remainder=0
8/2=4      remainder=0
4/2=2       remainder=0
2/2=1         remainder=0
1/2= 0         remainder=1
The binary would be: 00 01 00 00

For 3
3/2=1       remainder=1
1/2= 0         remainder=1
The binary would be: 00 00 00 11

For 1
1/2= 0         remainder=1
The binary would be: 00 00 00 01

The binary number would be:  
11000000.00010000.00000011.00000001
You might be interested in
What did czarnowski and triantafyllou learn from observing boat propulsion systems?
noname [10]
Czarnowski and Triantafyllou learned that boat propellers are not very efficient, except penguin propulsion systems.
7 0
3 years ago
Half of the integers stored in the array data are positive, and half are negative. Determine the
jonny [76]

Answer:

Check the explanation

Explanation:

Below is the approx assembly code for above `for loop` :-

1). mov ecx, 0

2). loop_start :

3).    cmp ecx, ARRAY_LENGTH

4).    jge loop_end

5).    mv temp_a, array[ecx]

6).    cmp temp_a, 0

7).    branch on nge

8).        mv array[ecx], temp_a*2

9).   add ecx, 1

10).   jmp loop_start

11). loop_end :

Assumptions :-

*ARRAY_LENGTH is register with value 1000000

*temp_a is a register

Frequency of statements :-

1) will be executed one time

3) will be executed 1000000 times

4) will be executed 1000000 times

5) will be executed 1000000 times

6) will be executed 1000000 times

7) `nge` will be executed 1000000 times, branch will be executed 500000 times

8) will be executed 500000 times

9) will be executed 1000000 times

10) will be executed 1000000 times

Cost of statements :-

1) 10 ns

3) 10ns + 10ns + 10ns [for two register accesses and one cmp]

4) 10ns [for jge ]

5) 10ns + 100ns + 10ns [10ns for register access `ecx`, 100ns for memory access `array[ecx]`, 10ns for mv]

6) 10ns + 10ns [10ns for register_access `temp_a`, 10ns for mv]

7) 10ns for nge, 10ns for branch

8) 30ns + 110ns + 10ns

10ns + 10ns + 10ns for temp_a*2 [10ns for moving 2 into a register, 10ns for multiplication],

110ns for array[ecx],

10ns for mv

9) 10ns for add, 10ns for `ecx` register access

10) 10ns for jmp

Total time taken = sum of (frequency x cost) of all the statements

1) 10*1

3) 30 * 1000000

4) 10 * 1000000

5) 120 * 1000000

6) 20 * 1000000

7) (10 * 500000) + (10 * 1000000)

8) 150 * 500000

9) 20 * 1000000

10) 10 * 1000000

Sum up all the above costs, you will get the answer.

It will equate to 0.175 seconds

7 0
3 years ago
Increasing your margins will increase the amount of space you have to type text on your document. Please select the best answer
Ksenya-84 [330]

It is false because if the margins, the space on the side of a paper, gets bigger, that means there is more emptiness and less space for text.

4 0
3 years ago
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic
GalinKa [24]

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

4 0
3 years ago
A(n) ____________ network should NOT be used when there are more than about twenty-five computers. Select one: a. Ring b. Ethern
nata0808 [166]
D the answer is client and server I believe
8 0
3 years ago
Other questions:
  • How do IT security workers help business
    5·1 answer
  • design the psuedocode for a program that allows a user to enter 10 numbers, then displays them in the reverse order of their ent
    6·1 answer
  • How do you read a column
    8·1 answer
  • Sam and Ella are arguing in the cafeteria. Sam says that if he throws a chicken tender with a greater speed, it will have a grea
    7·2 answers
  • How to search for the largest files on my computer vista?
    5·1 answer
  • What would be the output of system.out.println("fun\tny");
    10·1 answer
  • What formula would you enter in c4 that combines a4 and b4 to get a result like c2
    15·1 answer
  • Your data warehousing project group is debating whether to create a prototype of a data warehouse before its implementation. The
    12·1 answer
  • What are the difference among the whole note, half note and quarter note ? (this is music)
    12·2 answers
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!