1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
4 years ago
7

The conversion of decimal 0.0625 into its binary equivalent. Explain.

Computers and Technology
1 answer:
Rashid [163]4 years ago
4 0
D. 0.0001.......first the zero before the decimal point is devided by 2....so it gives out 0 as a reminder so u right 0. at first then to do the part after decimal...first multiply 0.625 by 2 which gives out 0.125 as a fractional number so 0 would be the number after "0." ...and again the answer 0.125 is multiplied by 2 which gives out 0.25....so again we get a zero as an integer so now it would be "0.00..." ....again multiply 0.25 by 2 which gives out 0.5....again the integer is 0....so we add another 0 after 0.00....which would then become 0.000.....after that again multiply 0.5 by 2 which would give 1 as a result....as the fractional part is over, u need to stop here....so add that 1 after the 0.000 which gives 0.0001 as a final result.
You might be interested in
From the philosophical standpoint, especially in the discussion of moral philosophy or ethics, why do we consider “murder” or “k
wlad13 [49]

Explanation:

Morality is a set of values ​​and habits that a society acquires over time and can be categorized as good and bad values, right and wrong, justice and crime. Ethics is defined as the study of morals, the practical application of moral behaviors defined by society.

Therefore, the concept of "murder" or "killing" is seen as an immoral act by the vast majority of society around the world, strengthened by the set of moral conduct common to all human beings, which are the Articles on the Universal Declaration of Human Rights. Human Rights, which is an official document of the UN, which contains several universair and analytical rules on the rights of every individual, such as the right to life, security, freedom, etc.

7 0
3 years ago
Write a note on secondary storage​
12345 [234]
Secondary storage refers to storage devices and media that are not constantly accessible by a computer system. Examples include external hard drives, portable flash drives, CDs, and DVDs.
good luck
4 0
4 years ago
Different units of CPU ?
deff fn [24]
The two typical components of a CPU include the following:<span>--The arithmetic logic unit (ALU), which performs arithmetic and logical operations. --<span>The control unit (CU), which extracts instructions from memory and decodes and executes them, calling on the ALU when necessary.</span></span>
3 0
3 years ago
The contents of an array of type ______ can be displayed with the cout operator (without specifying an element). - 1 point(s)
xxMikexx [17]
The contents of an array of type char can be displayed with the cout operator.  <span>Array declarations </span>must<span> contain the information about the size of the array. It is possible to leave the size out of the [ ] in the declaration </span>as long as<span> you initialize the array inline, in which case the array is made just large enough to capture the initialized data. </span>  
5 0
3 years ago
What can be used to visually represent information similar to a diagram
Assoli18 [71]
A vin diagram should help you lay it out

5 0
4 years ago
Other questions:
  • The conceptual phase of any system or just the software facet of a system best describes the sdlc
    9·1 answer
  • In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command li
    13·1 answer
  • Consider the following relation:CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)Assume that a car may be sold
    12·1 answer
  • When an Item is base lined, it becomes frozen, here frozenmeans that only creating an old version can change the item
    9·1 answer
  • All computer systems have
    14·2 answers
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Difference between a lesson plan and scheme of work​
    6·2 answers
  • Which is not and input device , keyboard , joystick, Monitor, Microphone​
    10·2 answers
  • Limited time only for christmas give yourself free 100 points YES YES yes yes yes
    6·2 answers
  • What is the error in this program?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!