1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
15

Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?

Computers and Technology
1 answer:
garik1379 [7]3 years ago
8 0

Answer:

D. 41

Explanation:

101001 is in base 2.

To convert 101001 to base 10;

1*2^5+0*2^4+1*2^3+0*2^2+0*2^1+1*2^0

1*32+0*16+1*8+0*4+0*2+1*1

32+0+8+0+0+1

=41

You might be interested in
Which does a traditional camera need in order to capture images?
pashok25 [27]

Answer:

I think secure digital is needed

3 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
4 years ago
Ip a 45-kg crate is placed on an inclined ramp. when the angle the ramp makes with the horizontal is increased to 24 ∘ , the cra
antoniya [11.8K]

There two problems related to this problem:


First is the coefficient of static friction between the map and the crate.


And the second one is at what angle does the crate begin to slide if the mass is doubled.


1.       To look for the coefficient of static friction:

ΣF = 0 


μ x m x g x cos θ = m * g * sin θ 


μ = sin θ/ cos θ = tan θ 


μ = tan 24 = 0.45

 

2.       At what angle… the solution is:


The static friction or μ does not depend on mass, so the angle is still 24.

7 0
3 years ago
Add criteria to this query to return records where the student lastname field begins with the letter
valentina_108 [34]

Answer:

To query the access database to return a group of records with lastname starting with A, change the LastName field's criteria to A, and then click the run button in the results ribbon group of the design ribbon tab.

Explanation:

Microsoft Access is a database management software used to create, manage, and query a database. Just like a spreadsheet and in relational databases, it stores data in records (rows) and fields (columns). To output the result of a query, the run button in the design ribbon tab is clicked.

8 0
3 years ago
As the senior analyst responsible for data staging, you are responsible for the design of the data staging area. If your data wa
adelina 88 [10]

Answer:

The corresponding schemas I use such as given below.

Explanation:

  • <u>Dim</u>: Used in the design for certain artifacts belonging to measurements.
  • <u>Fact</u>: Used for these artifacts throughout the design relevant to the truth
  • <u>Admin</u>: Used for all configuration-related artifacts that could be open to professional end-users.
  • <u>Audit</u>: That used to hold audit-related particles.
  • <u>Etl</u>: Is used for keeping objects, particularly staging details, directly connected to something like the ETL method.
  • <u>Report</u>: Used to keep objects utilized explicitly for programs for documentation.
  • <u>Olap</u>: Used for keeping objects directly used for systems for study.
  • <u>Test</u>: Used to carry objects which have been used exclusively for research.
  • <u>Useful</u>- Used to carry objects that just about any member including its implementation may typically use.
3 0
3 years ago
Other questions:
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • Without exception, you must always stop when ______________.
    14·1 answer
  • Are engineers who help to develop products and projects by creating technical drawings
    15·1 answer
  • Give four examples of devices which are both<br>Input and Output to a Computer.​
    12·1 answer
  • Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100
    10·1 answer
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • Larry does not want to save his internet browsing details on his computer. What files should Larry delete to clear his informati
    13·2 answers
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • Please help me with these two questions! 60 points!
    14·1 answer
  • Please help me asapppp!​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!