1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
12

(1)(50%) The program converts a three-ASCII-digit number to an 8-bit unsigned binary. For example, a 3-digit number as ‘0’ (=$30

), ‘1’ (=$31), and ‘8’ (=$38) should be converted into 0001 0010 in binary. A 3-digit number as ‘2’, ‘5’, and ‘5’ should be converted into 1111 1111 in binary. You may assume the value is no more than 255
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
8 0

Answer:

Explanation:

3 - digit number                                             8 - bit binary

0 (=$30), 1 (=$31), & 8 (=$38)                          00010010

1 (=$31), 2 (=$32), & 9 (=$39)                          10000001

2 (=$32), 3(=$33), & 0 (=$40)                          11100110

2 (=$32), 4 (=$34), & 1 (=$41)                           11110001

2 (=$32), 5 (=$35), & 2 (=$42)                           11111100

2 (=$32), 5 (=$35), & 3 (=$ 43)                           11111101

2 (=$32), 5 (=$35), & 4 (=$44)                            11111110

2 (=$32), 5 (=$35), & 5 (=$45)                            11111111              

You might be interested in
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items effic
sashaice [31]

Answer:

the ergonomics To prevent a laptop from being stolen, you can use a surge protector. False; To prevent laptops from being stolen, you can use a cable lock. What is a digital certificate?

6 0
2 years ago
PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
kaheart [24]

D is the answer  motherboard is correct

3 0
3 years ago
A paradigm innovation occurs when:
Viktor [21]
B. Because major shifts in thinking can cause change.
4 0
3 years ago
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
3 years ago
What commands does SuperKarel know that regular Karel does not?
luda_lava [24]

Answer:

turnRight and turnaround

Explanation:

The regular karel does not know these commands

5 0
2 years ago
Other questions:
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • Consider a computer that has a number of registers such that the three registers R0 = 1500, R1 =4500, and R2 = 1000.
    14·1 answer
  • Who was the 1st person to use the term television
    11·1 answer
  • What is an Apple Pen?
    5·2 answers
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • What is the definition of a flowchart? *
    13·1 answer
  • Abby has always dreamed of having her own ice cream shop. Now as a young entrepreneur she has decided to pursue her dream, but s
    13·1 answer
  • Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
    5·2 answers
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • Write a format operation that builds a string for the float variable amount that
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!