1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
6

Convert the following binary numbers to decimal:

Computers and Technology
1 answer:
olganol [36]3 years ago
8 0

Answer:

Hi!

10010101 = 149;

01110110 = 118;

00110011 = 51;

11100010 = 226;

10000001 = 129;

Explanation:

To convert binary numbers you can use this formula:

N = bit_{1} * 2^{0} + bit_{2} * 2^{1} + bit_{3} * 2^{2} + bit_{4} * 2^{3} + ... + bit_n 2^{n-1}, where position of the bit₀ is the rightmost digit of the number.

Results, using the formula:

10010101 = 1*2⁰+1*2²+1*2⁴+1*2⁷ = 1 + 4 + 16 + 128 = 149.

01110110 = 1*2¹+1*2²+1*2⁴+1*2⁵+1*2⁶  = 118;

00110011 = 1*2⁰+1*2¹+1*2⁴+1*2⁵ = 51;

11100010 = 1*2¹+1*2⁵+1*2⁶+1*2⁷ = 226;

10000001 = 1*2⁰+1*2⁷ = 129;

<em>Note:</em> All bits in 0 multiplied by any number are 0.

You might be interested in
Hello there!I have a Macbook Air and by accident I had put my finger on the screen and made a small white dot.
Mnenie [13.5K]
Dont worry happens to my sisters laptop once. You just have to wait it out.
It wont damage your computer. It means that your laptop is also sensetive so dont touch the screen with too much force.
Hope I helped you!
7 0
4 years ago
Read 2 more answers
I have a project on "USING ADVANCED FORMULAS". It wants me to make a spreadsheet to track payroll. I have no clue how to do this
ANTONII [103]
Try to do it on Microsoft word 2013
7 0
3 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
Which technology enables afloat forces to communicate more securely and to operate in a more dispersed manner?
Afina-wow [57]
<span>UHF and HF technology enables afloat forces to communicate more securely and to operate in a more dispersed manner.
</span>UHF stands for Ultra High Frequency, while HF stands for <span>High Frequency .
</span>The UHF range of the radio spectrum is the band<span> extending from 300</span>MHz<span> to 3 GHz and </span>is extensively used for satellite<span>communication and broadcasting, in </span>cellular telephone<span> and paging systems, and by third-generation (</span>3G<span>) </span>wireless services.
5 0
3 years ago
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now
Amiraneli [1.4K]

Answer: Virtualization

Explanation: Virtualization is the term that describes about creation of something than its actual version. In computer field , virtualization can happen in the storage devices, server elements,network components , operating systems etc.

The mechanism of virtualization helps in a creating a framework in which the resources is divided into multiple units so that more execution and processing can be done in operating system environment. So, the data center  has used the virtualization trend for the separate web servers

3 0
3 years ago
Other questions:
  • Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
    10·1 answer
  • Explain the four basic operation performed by every computer​
    11·2 answers
  • What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
    10·1 answer
  • There is a class called Roster whose constructor takes a List of tuples with the names of students and their grades in the class
    13·1 answer
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • What invention was key to computers being moved into homes and personal use?
    10·2 answers
  • Which examples are relevant sources for students to use in research?
    6·1 answer
  • which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
    14·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Anyone have gmetrix week 2 quiz?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!