1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
6

Count from 1 to 20(base10) using the following bases: 8, 6, 5, 3.

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
4 0

Answer:

Base 8:

1, 2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21, 22, 23, 24

Base 6:

1, 2, 3, 4, 5, 10, 11, 12, 13, 14, 15, 20, 21, 22, 23, 24, 25, 30, 31, 32

Base 5:

1, 2, 3, 4, 10, 11, 12, 13, 14, 20, 21, 22, 23, 24, 30, 31, 32, 33, 34, 40

Base 3:

1, 2, 10, 11, 12, 20, 21, 22, 100, 101, 102, 110, 111, 112, 120, 121, 122, 200, 201, 202

Explanation:

When counting on a certain base n you can only use n numerals (including the zero). So, if you count in base 8, you have 8 numrals, these are 0, 1, 2, 3, 4, 5, 6 and 7. The numeral 8 does not exist in base 8 the same as there is no numeral for 10 in base 10. When you're counting beyond the single numerals you add a 1 to the numeral in the column in front (which starts at zero) and reset the previous column.

You might be interested in
Which of the following keyboard shortcuts should be pressed to hide the columns which are selected in a worksheet? Question 2 op
soldi70 [24.7K]

Answer:

control 0

Explanation:

did the quiz on quizzes

5 0
3 years ago
)What is proceduralabstraction, and why is it important inComputer Science
STatiana [176]

Answer:

Procedural abstraction is a method in which all sub tasks of a whole functionality must be created separately as method and each method/ procedure must be performing a distinct functionality. For example if we want to write a program to calculate and display result of students in class and create separate methods to get students record, to calculate grades to display results is a procedural abstraction approach. Here not only the methods created have distinctive function the administrative can vary the level of abstraction as well.

It is important in computer science for the following ways:

1) Increase the level of code readiness as all separate functionality tasks will have a separate methods.

2) Prevents unauthorized of data.

6 0
3 years ago
Using ajax technologies and apis, websites and applications can pull information from a variety of sources in order to create __
Mamont248 [21]

Answer:Mashups

Explanation:mashup has several meanings. it used to describe songs that meshed two different styles of music into one song.

It is also used to describe videos that have been compiled using different clips from multiple sources.

mashup also describes a Web application that combines multiple services into a single application.

3 0
3 years ago
Which hardware component is most suspect if a user can barely make out
kirill115 [55]

C: Backlight, hopes this helps

6 0
4 years ago
Suppose that a single character is stored in a computer using eight bits. (a) How many bit patterns have exactly three 1 's? (b)
Nesterboy [21]

The answer & explanation for this question is given in the attachment below.

8 0
3 years ago
Other questions:
  • Technician A says one disadvantage of fiber optic cables is that they are more expensive and very heavy. Technician B says one d
    6·1 answer
  • Why is internet safety important
    14·2 answers
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
    11·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • What does C.L.O stands for?
    13·2 answers
  • Electronic type is often considered to be the latest step in the evolution of the written ______________.
    10·1 answer
  • How does confidentiality protect people and their online activity?
    13·1 answer
  • open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!