1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
13

Add the following binary numbers. 101110010 and 111001101

Computers and Technology
1 answer:
bonufazy [111]3 years ago
4 0

Answer:

101110010 is 370 in decimal (base 10, what we usually do math in) and 111001101 is 461 in decimal. The sum of 370 and 461 is 831, and 831 is binary is 1100111111. So, if you want the answer in decimal it is \boxed{831_{10}} and if you want the answer in binary, it is \boxed{1100111111_2}.

You might be interested in
PLEASE HELP ASAP
Flura [38]

every photo, vid, tweet... (c)

3 0
3 years ago
Count Uppercase, Lowercase, special character and numeric values
Rina8888 [55]

Answer:

View Image

Explanation:

  1. Import the <em>#include <ctype.h> </em>so that you can use the function to check the characters in the string.
  2. Create variable to store letter counts and user input.
  3. Ask for user input with scanf().
  4. Loop through the user input and check each character. Increase count accordingly.
  5. Print out final result.

7 0
4 years ago
Read 2 more answers
IOS jail broken or Android unrooted which is better to hack with
Ira Lisetskai [31]
IOS Jail Broken - that is more advanced then an android
3 0
3 years ago
A(an) _______ is a set of instructions that a computer follows to perform a task.
Vikentia [17]
A(an) _______ is a set of instructions that a computer follows to perform a task.Answer is Program .
I hope the answer of the question.
7 0
4 years ago
Which security risk is an example of malware?
marshall27 [118]
Viruses, worms, ransomware, spyware and trojan horses. These are some answers 
3 0
4 years ago
Read 2 more answers
Other questions:
  • Number of byte required to store illumination
    13·1 answer
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    10·1 answer
  • What is a burned edge ?
    8·1 answer
  • Explain the concept of scalability. How would you respond?
    15·1 answer
  • Can Anybody Answer This
    8·1 answer
  • Fill in the blanks of the SQL Statements: Fund_Id VARCHAR(10) , Donor_id VARCHAR(10) , Count_Of_Receipts INTEGER, Total_Receipts
    15·1 answer
  • SummaryIn this lab, you complete a partially prewritten Java program that uses an array.The program prompts the user to interact
    12·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
  • Which of the following correctly calculates the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!