1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
10

Multiply 1101 and 0110 in binary.

Computers and Technology
1 answer:
mojhsa [17]3 years ago
5 0

Answer:

1101*0110=1001110

Explanation:

First, multiply like if you were multiplying normally, but keep in mind this:

1*0=0

0*0=0

0*1=0

1*1=1

You should get this result:

          1 1 0 1

         0 1 1 0 x

-------------------------

         0 0 0 0

      1  1  0  1  0

   1  1  0  1  0 0    

0 0 0 0 0  0 0

Now sum these terms:

        0 0 0 0

     1  1  0  1  0

  1  1  0  1  0 0    +

0 0 0 0 0  0 0

-------------------------

The first column, from the right:

0+0+0+0=0

The second column, from the right:

0+1+0+0=1

The third column, from the right:

0+0+1+0=1

The fourth column, from the right:

1+1+0=2,

2 in binary is 0010, so we put 0 and we carry the 1

The fith column from the right:

(because we carried the 1 from the previous sum)

1+1+0=2, so the same, we put 0 and we carry the 1

And finally the sixth column, from the right:

(because we carried the 1 from the previous sum)

1+0=1

So:

          1 1 0 1

         0 1 1 0 x

-------------------------

        0 0 0 0

     1  1  0  1  0

  1  1  0  1  0 0    +

0 0 0 0 0  0 0

-------------------------

1  0 0  1  1  1  0

Let's verify the results:

1101=2^{3} +2^{2} +0 +2^{0} =8+4+0+1=13

0110=0+2^{2} +2^{1} +0 =0+4+2+0=6

13*6=78

1001110=2^{6} +0+0+2^{3} +2^{2} +2^{1} +0=64+0+0+8+4+2+0=78

You might be interested in
A keyboard, mouse, and microphone are examples of ________.
kykrilka [37]

Answer:

A keyboard, mouse, and microphone all are examples of <u>peripheral devices.</u>

Explanation:

hope this helps

5 0
3 years ago
Read 2 more answers
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
SOVA2 [1]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
5 0
3 years ago
Read 2 more answers
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
Which of the following is a/are question(s) that you should ask before you create an Access report?
never [62]

Answer: All the above questions should be asked

Explanation:  Access report are the reports in access which provides the summarized and formatted information display in database. The information in the database is extracted from tables.The access report requires purpose of the report before preparation and the accessing users information to be known .

It is asked to make sure about that no unauthorized access of the report can take place. Distribution of the report among the other user or client is also a major question to be asked as to keep the record of the accessing of access report..Thus, all the question mentioned in the options are correct.

5 0
4 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • 1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
    6·1 answer
  • Web-based application software is software that ________.
    13·1 answer
  • How to build an arch bridge​
    5·1 answer
  • An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
    14·2 answers
  • Description:
    7·1 answer
  • What is data Communications​
    11·2 answers
  • Which of the following statements accurately describes linked data?
    5·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • Which steps of the management science process can either be a recommended decision or information that helps a manager a decisio
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!