1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alona [7]
3 years ago
11

Make the smallest

Computers and Technology
1 answer:
seraphim [82]3 years ago
3 0

Answer:

<em>Whole Numbers:</em>

0000 0001 (Binary) --> 1 (Decimal)

<em>Real Numbers:</em>

0000 0001 (Binary) -->  0.00390635 (Decimal)

Explanation:

In general, the smallest nonzero number that can be displayed in binary that is a whole number is 1.  Consider that as you increase by 1 in the binary system starting from 0, you will have the following:

0000 0000 == 0

0000 0001 == 1 (Smallest nonzero)

0000 0010 == 2

0000 0011 == 3

... etc.

Notice the smallest value here is decimal 1.  With this in mind, you will need to "program" you Flippy Do Pro to display this value.  Alternatively, if you consider decimal numbers in binary with the Flippy Do Pro, you can have even smaller nonzero numbers.  Depending on where you decide to place the decimal, you can even have smaller nonzero values.

Let's assume that you say this is a fractional representation of binary on the Flippy Do Pro.  Then, you will say your decimal is infront of the display of the Flippy Do Pro, hence index 9 (which is not displayed).  From here, you will simply say the following:

0000 0000 == 0.0

0000 0001 == 0.00390635 (Smallest nonzero)

0000 0010 == 0.0078125

0000 0100 == 0.015625

... etc.

Note, in binary, as you move the value of 1 to the right of the decimal, you are doing (1 / 2^n), where n is the index value to the right of the decimal.

Hence, depending on if you are to consider just whole numbers or real numbers, the smallest value displayed can be different even though the number being displayed is still 0000 0001.

Cheers.

You might be interested in
Which of the following actions would help people determine their interests?
lorasvet [3.4K]
That depends on what the actions are, and what their personality is like.
8 0
3 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?
KatRina [158]
I use host -a

dig and nslookup could do it, I forget the switches and arguments.
8 0
4 years ago
What types of disasters might be most likely to affect your community? Type your answers in the space provided. When you are fin
Irina18 [472]
N͟a͟t͟u͟r͟a͟l͟ d͟i͟s͟a͟s͟t͟e͟r͟s͟. Specifically, things such as hurricanes, earthquakes, and tsunamis.
6 0
4 years ago
Read 2 more answers
If you want smaller tables to fit on a single page?
Vinil7 [7]
Well what i do is i make every thing a little smaller and if that dose not work make it bigger so that it just gos over the bottom of the page
8 0
3 years ago
Other questions:
  • What are the correct steps to find the system specifications such as the amount of ram or system type for windows 7 machine?
    5·1 answer
  • Can you plug a usb 2.0 into a 3.0 port on your computer
    12·1 answer
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • "You are setting up a new subnetwork on an existing network. Management has asked that you use existing cabling that the company
    14·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Witch of the following is a malicious program that can replicate and spread from computer to computer?
    13·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programmin
    10·1 answer
  • Differentiate between a software package and integrated software and why users would choose one over the other.
    11·1 answer
  • A series of instructions coded in a language to instruct the computer to perform a task is
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!