1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
15

We combine the three binary bits 1, 0, and 1 to form 101 in order to represent the number 5. What does the leftmost 1 in 101 mea

n? What is there 1 of?
Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
4 0

Answer:

  • The leftmost 1 in 101 gives the 4.
  • 1 in 101 (using binary system) gives the bits that must be counted to make a decimal number.

Explanation:

While working on binary system, we represent the decimal digits (0-9) by using only two digits 0's and 1's. They are written by dividing the decimal digit by 2 and then recording the remainder bits in reverse order.

As given in the question 5 is represented in binary as 101.

Now converting binary to decimal:

  • The bits of binary number are multiplied by increasing powers of 2 (starting from the right) and added to get decimal value.
  • So the binary number 101 will be interpreted as:

        =1*2^2+ 0*2^1 + 1*2^0\\= 1*4 + 0 + 1\\= 4+1\\=5

  • So the leftmost 1 will show the presence of 4.
  • 1 in the number 101 shows which bits will be weighted to give the required value.

i hope it will help you!

You might be interested in
Four workers take an extra half-hour for lunch, at a cost of $14/ hour
Usimov [2.4K]

Answer:

whats the rest ?

Explanation:

whats the rest ?

8 0
3 years ago
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
An automotive engine’s camshaft rotates?
ryzh [129]
<span>C. The same speed as the crankshaft..... hope this helps!
</span>
8 0
3 years ago
You are to design class called Employee whose members are as given below:
frozen [14]

Answer:

//The Employee Class

public class Employee {

   char name;

   long  ID;

//The constructor  

public Employee(char name, long ID) {

       this.name = name;

       this.ID = ID;

   }

//Method Get Person

   public void getPerson (char newName, long newId){

       this.ID = newName;

       this.ID = newId;

   }

//Method Print

   public void print(){

       System.out.println("The class attributes are: EmpName "+name+" EmpId "+ID);

   }

}

The working of the class is shown below in another class EmployeeTest

Explanation:

public class EmployeeTest {

   public static void main(String[] args) {

       Employee employee1 = new Employee('a', 121);

       Employee employee2 = new Employee('b', 122);

       Employee employee3 = new Employee('c', 123);

       employee1.print();

       employee2.print();

       employee3.print();

   }

}

In the EmployeeTest class, Three objects of the Employee class are created.

The method print() is then called on each instance of the class.

6 0
3 years ago
A _____ is a specially formatted file that, once mounted, or connected to a virtual machine appear and operate pretty much ident
Sever21 [200]

A <u>Virtual hard disk</u> is a specially formatted file that, once mounted, or connected to a virtual machine appear and operate pretty much identically to a physical hard drive.

<h3>What is a virtual hard disk?</h3>

A virtual hard disk (VHD) is a disk picture file format for storing the entire ranges of a computer's hard drive.

The disk image, sometimes called a virtual machine (VM), duplicates an existing hard drive, including all data and structural elements.

<h3>Why would you count a virtual hard disk?</h3>

Typically, a VHD comes in handy to add additional storage to a Hyper-V virtual machine, and thanks to its capacity to support other OS installations, you can even use this storage virtualization technology to make a dual-boot system without modifying an existing partition.

To learn more about  virtual hard disk , refer

brainly.com/question/4733444

#SPJ4

4 0
2 years ago
Other questions:
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • Which best explains what a credit score represents
    10·2 answers
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem
    14·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • Your baby brother has found the hammer and is eagerly eyeing one of the boxes. Describe and analyze an algorithm to determine if
    15·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • The algorithm for solving the problem of average of five (5) numbers​
    10·1 answer
  • How is distributed ledger technology (DLT) used in a blockchain?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!