1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
4 years ago
9

Convert (35.125)10 to binary

Computers and Technology
1 answer:
cupoosta [38]4 years ago
7 0

Answer:

The answer is: 100011.001₂.

Explanation:

First, transform to binary the integer part: 35. Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

  • 35 ÷ 2 = 17 + 1;
  • 17 ÷ 2 = 8 + 1;
  • 8 ÷ 2 = 4 + 0;
  • 4 ÷ 2 = 2 + 0;
  • 2 ÷ 2 = 1 + 0;
  • 1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

  • 35₁₀ =  100011₂

Then, transform to binary the fractional part: 0.125. Multiply it repeatedly by 2, keeping track of each integer part of the results, until we get a fractional part that is equal to 0:

  • 0.125 × 2 = 0 + 0.25;
  • 0.25 × 2 = 0 + 0.5;
  • 0.5 × 2 = 1 + 0;

Construct the fractional part base 2 representation by taking all the integer parts of the multiplying operations, starting from the top of the list.

0.125₁₀ =  0.001₂

Then you have:

35.125₁₀ =  100011.001₂

You might be interested in
Jacinta registered herself on a social-networking site. She receives one or two emails every day about promotional offers as wel
Rainbow [258]
It would be Spam. . . . 

3 0
4 years ago
Windows server 2012 r2 includes hyper-v in which edition(s)?
SashulF [63]
<span>The Standard and Datacenter editions.</span>
7 0
4 years ago
Software licensed as proprietary
steposvetlana [31]

Answer:

Does not permit source code changes.

Explanation:

3 0
3 years ago
Read 2 more answers
_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adapta
Ghella [55]

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

7 0
3 years ago
Before your shell forks a new process to call execvp(), it should parse the input string and separate it into a collection of su
kompoz [17]

Answer:

#define LSH_RL_BUFSIZE 1024

char *lsh_read_line(void)

{

int bufsize = LSH_RL_BUFSIZE;

int position = 0;

char buffer = malloc(sizeof(char) bufsize);

int c;

if (!buffer) {

   fprintf(stderr, "lsh: allocation error\n");

   exit(EXIT_FAILURE);

}

while (1) {

   // Read a character

   c = getchar();

   // If we hit EOF, replace it with a null character and return.

   if (c == EOF || c == '\n') {

     buffer[position] = '\0';

     return buffer;

   } else {

     buffer[position] = c;

   }

   position++;

   // If we have exceeded the buffer, reallocate.

   if (position >= bufsize) {

     bufsize += LSH_RL_BUFSIZE;

     buffer = realloc(buffer, bufsize);

     if (!buffer) {

       fprintf(stderr, "lsh: allocation error\n");

       exit(EXIT_FAILURE);

     }

   }

}

}

Explanation:

3 0
3 years ago
Other questions:
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • Which risk management framework does the organization of standardization publish
    13·1 answer
  • If a*b = 2a - 56, calculate the value of<br>3 * 4​
    14·1 answer
  • Which of the following makes a virtual tour different from a printed map
    6·2 answers
  • The large program that controls how the CPU communicates with other components is the​
    9·1 answer
  • Encryption is the key to keeping your personal information secure online.<br><br> True<br><br> False
    11·1 answer
  • Arrange the binary number in increasing order of their arithmetic output in the decimal number system ?
    9·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • How do spear phishing attacks differ from standard phishing attacks?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!