1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
8

Perform the following conversions from decimal to binary, octal and hexadecimal systems. a) 1710 b) 132110C) 36010d).7510e).3906

2510 f) 910

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0

Answer:

Question Decimal Binary Oct Hex

a 1710  11010101110 3256 6AE

b 20058380 1001100100001000100001100 114410414 132110C

c 15368 11110000001000 36010 3C08

d 3912 111101001000 7510 F48

e 0.39 100111 47 27

f 910 1110001110 16161 38E

Explanation:

I've attached an easier to read table.

https://www.mathwarehouse.com/solved-problems/conversions/convert-1710-from-decimal-to-binary      

https://www.geeksforgeeks.org/convert-decimal-fraction-binary-number/      

You might be interested in
What is the next line?
lianna [129]

Answer:

4

Explanation:got it right on edg.

4 0
2 years ago
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
3 years ago
Type of file containing instructions that tell your computer how to perform ___
julsineya [31]

Answer:

A)File

B)Native

C)Extension

D)File size

Explanation:

6 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
iogann1982 [59]

Answer:

a. Security tab

Explanation:

These options would be under the security tab. The security tab allows you to protect yourself when browsing the web. It includes features such as cookies, location, pop-up blocker and tracking protection. This allows you to avoid harmful or malicious content. In this example, your coworker wants to minimize attacks when using the Internet. Therefore, this is the tab that would help her the most.

7 0
3 years ago
14. Blender® does not typically use pop-up boxes. (1 point)
ivolga24 [154]
Hey buddy 

so 14 it was be a long time but l think it is true 

15 is <span>the range of tools and functions associated with that activity</span>
5 0
3 years ago
Other questions:
  • Damion recently did an update to his computer and added a new video card. After the update, Damion decided that he would like to
    13·1 answer
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • 2) Complete the get_num_of_characters() function, which returns the number of characters in the user's string. We encourage you
    11·1 answer
  • Help me out here pleaseeeee
    9·2 answers
  • How many possible keys does the playfair cipher have? an approximate power of 2
    14·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)
    9·2 answers
  • A project manager is responsible for (check all that apply)
    13·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • Please do this now
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!