1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
9

How do you convert a decimal to binary?

Computers and Technology
2 answers:
lidiya [134]3 years ago
7 0
B. repeatedly divide the decimal number by 2
FinnZ [79.3K]3 years ago
4 0

B. Repeatedly divide the decimal number by 2

You might be interested in
How long does a seller have to ship an item on offerup
ra1l [238]

They have up to six days to ship the item after it has been purchased via either the Buy Now option or them accepting an offer.

7 0
2 years ago
A copy machine is available 24 hours a day. On a typical day, the machine produces 100 jobs. Each job takes about 3 minutes on t
Hoochie [10]

Answer:

13.3%

Explanation:

OEE= Availability × Performance × Quality

Availability = Run Time/ Planned Production Time

Run time = 3*100 = 300 + 0.2* 300 = 1.2 *300 = 360 mins

Planned Production time = 24*60 = 1440 mins

Availability = 360/1440 = 1/4 = 25%..............1

Performance = (Ideal Cycle Time × Total Count) / Run Time

Ideal Cycle Time = 2 min (Only the processing time)

Total Count= 100+20 = 120

Performance = 2*120/360 =66.67% .............2

Quality = 100%-20% = 80%.......3

Frpm 1,2,3

OEE=25% * 66.67 % * 80% =

0.13334=13.3%

4 0
4 years ago
What is the name of the image window area that allows you to determine if a line is truly horizontal or vertical
kherson [118]
The answer is ruler. thank you
4 0
3 years ago
Read 2 more answers
Online banking tools allow you to pay bills from your computer. <br> a. True<br> b. False
Vaselesa [24]
On your online bank you can add bills from your computer. 
5 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Using the CPI to calculate the inflation rate​ _______________ the underlying inflation​ rate, and using the core inflation rate
    7·2 answers
  • While reading his favorite outdoor sports magazine, Jeff sees an advertisement for a new camping tent that is designed for quick
    12·2 answers
  • _____ is a feature that records the changes you make to a document.
    12·1 answer
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • python Create a new qualitative variable, called Elite, by binning the Top10perc variable. We are going to divide universities i
    6·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • State four reasons why office automation is adopted in business establishment?​
    7·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    12·2 answers
  • Who addicted to fnaf
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!