1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
4 years ago
9

Convert (35.125)10 to binary

Computers and Technology
1 answer:
cupoosta [38]4 years ago
7 0

Answer:

The answer is: 100011.001₂.

Explanation:

First, transform to binary the integer part: 35. Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

  • 35 ÷ 2 = 17 + 1;
  • 17 ÷ 2 = 8 + 1;
  • 8 ÷ 2 = 4 + 0;
  • 4 ÷ 2 = 2 + 0;
  • 2 ÷ 2 = 1 + 0;
  • 1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

  • 35₁₀ =  100011₂

Then, transform to binary the fractional part: 0.125. Multiply it repeatedly by 2, keeping track of each integer part of the results, until we get a fractional part that is equal to 0:

  • 0.125 × 2 = 0 + 0.25;
  • 0.25 × 2 = 0 + 0.5;
  • 0.5 × 2 = 1 + 0;

Construct the fractional part base 2 representation by taking all the integer parts of the multiplying operations, starting from the top of the list.

0.125₁₀ =  0.001₂

Then you have:

35.125₁₀ =  100011.001₂

You might be interested in
What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at
Ray Of Light [21]
The answer is a) It improves upon the two-phased commit by requiring that locks be acquired at the start of a transaction.

Reason: The 3PC is an extension or you can say developed from 2PC that avoids blocking of an operation. It just ensures that first n sites have intended to commit a transaction that means it acquires commits or locks before the start of any transaction to avoid any blocking.

Option b) is wrong as it does not allow coordination, it just let all the other sites do their transaction if any other site is blocked, so no coordination is there between sites that they will wait till their coordinator is corrected.

Option c) is wrong as lock operations are shared between other connections as when their coordinator fails, the new coordinator agrees to the old coordinator that they had shared locks before and they can start their transaction.

Option d) is wrong as option a) is correct.

If you like the answer, please upvote.
4 0
3 years ago
the two main ways in which marketers address the competition with their strategies are by satisfying a need better than a compet
Nonamiya [84]

Offering a lower price (Apex)

4 0
3 years ago
Read 2 more answers
What is communication barriers?​
SSSSS [86.1K]

Answer:

A communication barrier is anything that prevents us from receiving and understanding the messages others use to convey their information, ideas and thoughts.They can interfere with or block the message you are trying to send.

7 0
3 years ago
Read 2 more answers
How is photography like jazz music?
Wewaii [24]
LIke jazz, photography has fallings that are being implied to the pictures such as the jazz music. These felling or as there commonly know as soul can make great music and even HD pictures in photography.
7 0
3 years ago
Describe the series of connections that would be made, equipment and protocol changes, if you connected your laptop to a wireles
Serggg [28]

Answer:

Check Explanation.

Explanation:

Immediately there is a connection between your laptop and the wireless hotspot, data will be transferred via the Physical layer that will be used for encoding of the network and the modulation of the network and that layer is called the OSI MODEL.

Another Important layer is the APPLICATION LAYER in which its main aim and objectives is for support that is to say it is used in software supporting.

The next layer is the PRESENTATION LAYER which is used during the process of sending the e-mail. This layer is a very important layer because it helps to back up your data and it is also been used to make connections of sessions between servers of different computers

5 0
3 years ago
Other questions:
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    10·2 answers
  • The _______ contains the most commonly used commands.
    6·2 answers
  • The following SQL statement contains which type of subquery? SELECT title FROM books WHERE EXISTS (SELECT isbn FROM orderitems W
    14·1 answer
  • The camera still is bad even with the new iPhone xr and especially in low light it is even worst because you can see the pixels
    15·1 answer
  • Acciones de un lápiz
    7·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • What is your favorite anime ( All movies and episodes related to them count )
    8·2 answers
  • Consider the following language:
    5·1 answer
  • in ____ structures, the computer repeats particular statements a certain number of times depending on some condition(s).
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!