1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

Convert the following binary numbers to decimal numbers. (Show your work) a. 110110 b. 100111 c. 101101

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

a.110110 = 45

b.100111=39

c.101101=45

Explanation:

We can convert a binary number to a decimal number by multiplying the respective 1's and zeroes to the respective powers of 2.

for 110110

1x2⁵+1x2⁴+0x2³+1x2²+1x2¹+0x2⁰

=32+16+4+2

=54.

for 100111

1x2⁵+0x2⁴+0x2³+1x2²+1x2¹+1x2⁰

=32+4+2+1

=39

for 101101

1x2⁵+0x2⁴+1x2³+1x2²+0x2¹+1x2⁰

=32+8+4+1

=45

You might be interested in
______ provide visual representations of the options available for a given command
anygoal [31]

The visual representations is provided by the Gallery in the computer system.

Basically, gallery means the collection of pictures in a Computer.

  • Gallery is what enables systematic display and the management of distinct images in the computer.

  • A very good illustration is use of Clipart images. It is a ready made picture gallery available in the computer.

  • Every function on computer are represented with an icon, the icon images are enable through the Gallery.

In conclusion, the Visual representations of the options available for a given command is provided by the Gallery.

Read more about Gallery here

<em>brainly.com/question/2946480</em>

5 0
3 years ago
How does having weak security on your browser represent the weakest link in a network
kozerog [31]

Answer:

1. Your location is always exposed "might not be a problem, until it is"

2. Computer Viruses as your browser allows them

3. Hackers, of course, Ransomware attacks

4. SpyWares, read terms and condition or atleast visit trusted sources

5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.

6...... ALWAYS STAY SECURED

YOU WERE NEVER THE TARGET, JUST THE VICTIM

5 0
3 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical
Alchen [17]

Answer:

The answer is not native. I just got in wrong.

Explanation:

Edge 2021

4 0
3 years ago
Read 2 more answers
What is a function in Microsoft Excel?
uranmaximum [27]

Answer:

Tool for creating charts.

Explanation:

MS excel is clearly used for designing charts and spreadsheet in our daily life.

4 0
3 years ago
Other questions:
  • ____ are not associated with data from the database and are used to display such things as the report's title
    15·1 answer
  • A company wishes to move all of its services and applications to a cloud provider but wants to maintain full control of the depl
    7·1 answer
  • After typing “application letter” in the Search window in the New dialog box, Nate clicks the Education category. Three letters
    9·1 answer
  • PLEASE PLEASE PLEASE PLEASE HELP!!! I REALLY NEED HELP AND ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·1 answer
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • A search engine is the same as a browser.<br> \
    11·1 answer
  • What is the difference between primary storage, secondary storage and off-line storage?
    5·1 answer
  • What's the name of all kind of money around the world
    5·2 answers
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • Which of these best represents a call to action?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!