1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
2 years ago
6

Count from 1 to 20(base10) using the following bases: 8, 6, 5, 3.

Computers and Technology
1 answer:
Licemer1 [7]2 years ago
4 0

Answer:

Base 8:

1, 2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21, 22, 23, 24

Base 6:

1, 2, 3, 4, 5, 10, 11, 12, 13, 14, 15, 20, 21, 22, 23, 24, 25, 30, 31, 32

Base 5:

1, 2, 3, 4, 10, 11, 12, 13, 14, 20, 21, 22, 23, 24, 30, 31, 32, 33, 34, 40

Base 3:

1, 2, 10, 11, 12, 20, 21, 22, 100, 101, 102, 110, 111, 112, 120, 121, 122, 200, 201, 202

Explanation:

When counting on a certain base n you can only use n numerals (including the zero). So, if you count in base 8, you have 8 numrals, these are 0, 1, 2, 3, 4, 5, 6 and 7. The numeral 8 does not exist in base 8 the same as there is no numeral for 10 in base 10. When you're counting beyond the single numerals you add a 1 to the numeral in the column in front (which starts at zero) and reset the previous column.

You might be interested in
The three main objectives of information security are
kirill115 [55]

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

7 0
2 years ago
Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
katen-ka-za [31]
I believe it’s B)LAN

Explanation:
A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources. For example, a LAN may connect all the computers in an office building, school, or hospital. Typically, LANs are privately owned and managed.
4 0
2 years ago
What are the basic computer components that must be purchased in order for the computer to function efficiently?
V125BC [204]
Motherboard
Power Supply
Graphics Card (gpu)
Storage (Hard Drive or Solid State Drive)
Processor (cpu)
RAM

That should be the main components. There are other non-essential ones.

6 0
3 years ago
Will Give Brainliest!
liraira [26]

You have to wait a little bit until you can give the person brainiest. You mostly give it to someone who gave a great answer. :)

7 0
3 years ago
Read 2 more answers
1.Write the Qbasic program to find sum of any 10 different numbers.
dybincka [34]

Answer:

1.

DIM myArray(10) as INTEGER

LET A = 0

FOR I = 1 TO 10 STEP 2

INPUT “INPUT NUMBER”; myArray(i)

LET A = A + myArray(i)

NEXT  

PRINT A

END

2.

REM PROGRAM FOR CALCULATING THE SIMPLE INTEREST

CLS

INPUT “INPUT THE PRINCIPAL”; P

INPUT “INPUT THE TIME”; T

INPUT “INPUT THE RATE”;R

SI = P* T * R / 100

PRINT “SIMPLE INTEREST =”; SI

END

Explanation:

Please find the respective programs in the answer section.

4 0
3 years ago
Other questions:
  • The amount of data is increasing exponentially over time. true or false.
    6·1 answer
  • Which of the following was one of the first internet search engines? A. archie B. google C. Yahoo D.ask
    7·1 answer
  • An iphone is a form of a computer
    7·2 answers
  • What are the three types of programming design?
    15·1 answer
  • You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain
    8·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • A production house needs an operating system that captures saves and generates information within a specific time. Which type of
    11·1 answer
  • Read the scenario below, and then answer the question.
    13·1 answer
  • 4.(L.5.1.A) Select the sentence that includes an interjection,
    12·1 answer
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!