1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
13

En su cuaderno o carpeta de trabajo realice la conversión del sistema de numeración binario a octal según este ejemplo de manera

clara y sencilla de los siguientes números. 110002 11011112 110000012 00101102 11002
Computers and Technology
1 answer:
salantis [7]3 years ago
5 0

Answer:

Following are the  conversion from binary to octal numbers:

Explanation:

Given values:

\to (11000)_2= (30)_8  \\\\ \to (1101111)_2 = (157)_8 \\\\ \to (11000001)_2=(301)_8 \\\\ \to  (0010110)_2=(26)_8 \\\\ \to (1100)_2= (14)_8

Steps to convert the binary value to octal value:

First, we convert the given binary value to the decimal point values, for example:

\to (11000)_2=  1 \times 2^4+1 \times 2^3+0 \times 2^2 + 0 \times 2^1+0 \times 2^0\\\\

                  =  1 \times 16+1 \times 8+0 \times 4 + 0 \times 2+0 \times 1\\\\= 16+ 8+0+0+0\\\\= 24\\

After converting the binary value into a decimal number, then we convert the decimal to octal, to convert the value into octal we divide the value from 8.

\to (24)_{10}= (30)_8

similarly, we solve all of the above values.

You might be interested in
Select the correct answer
jonny [76]

Answer:

Obviusly it's option A : blinking your eyes when dust blows

Explanation: coz simple reflexes are prompt, short-lived, and automatic and involve only a part of the body

4 0
3 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
pentagon [3]

Answer:

Sniffing is the correct answer to the given question .

Explanation:

The main objective of Sniffing is to leads and stealing the information interception by detecting the network activity this activity is done by the Sniffing process .When the information is sent through the networks, the information inside the data packet can be detected  by using a sniffer .The sniffer is used in sniffing process.Information is accessed  by the sniffer because the information packets that are sent in the network  are not secured.

By using the Sniffing technique the hackers hacked the company's improperly-secured wireless network and stole customers ' credit card details as well as employee social security numbers.

6 0
4 years ago
What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
Gala2k [10]

A,B,C AND D.  All depend on end user uses.

A. sites that connect you to more information on your topic

B. databases that link your topic to available sources

C. indexes on connective materials

D. shortcuts to help you narrow the search field

<u>Explanation:</u>

Boolean connectors are nothing but Boolean operators such as AND, OR, NOT, XOR,IMP, ISNOT , “=”, “>=”, “<>”,”<=” extra.

It all depends up how the end user uses in the programming languages. Normally if Boolean connector returns true value, instruction or set of instruction are used to execute for next core of action in the programming language.

Mostly in any programming language relation operators such as “=”, “>=”,”<=”,” <>” extra with his combination add on logical operators are used such as “And”, “OR” and “NOT” extra.

3 0
3 years ago
Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
SVEN [57.7K]

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

5 0
2 years ago
What education and training is required to be an applications software engineer?
Vitek1552 [10]
Expertise in Computer Science/ Computer Programming Tools. C, C++, Java Visual Basic , Android or iphone. BS Software Engineering
7 0
4 years ago
Other questions:
  • What is the last step when creating a maintenance schedule? develop a reminder system read the manuals log the maintenance compl
    6·1 answer
  • For a horror film, Pauline wants to show a computer-generated monster appearing from the body of an actor. How can she do this?
    8·1 answer
  • What is basic statement made up of​
    10·2 answers
  • Which is the correct attribute syntax
    9·1 answer
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • Describe a game that you have played (video game or other type of game) that had a good balance between being easy to learn the
    6·1 answer
  • Based on the following quote from Leonardo Da Vinci, what would be his definition of a fine artist? “Principles for the Developm
    11·2 answers
  • The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.
    13·1 answer
  • Re:
    15·1 answer
  • I NEED HELP W/ BINARY NUMBERS ‼️⚠️‼️⚠️‼️⚠️‼️ DUE IN 15 MINUTES
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!