1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
12

Convert to binary 140

Computers and Technology
1 answer:
Ber [7]3 years ago
5 0

00110001 00110100 00110000

You might be interested in
The following is true about SPAM ________.
aev [14]

Answer:

a, c, and d.

Explanation:

Let's examine these options:

a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.

c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.

d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.

8 0
3 years ago
Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 38 then the outpu
Likurg_2 [28]

Answer:

Following are the program in the C++ Programming Language.

#include <iostream>

using namespace std;

//define function for swapping

void SwapValues(int* userVal1,int* userVal2){  

//set integer variable to store the value

int z = *userVal1;

//interchange their value

*userVal1 = *userVal2;  

//interchange their value

*userVal2 = z;

}

//define main method

int main()

{    

//declare variables

int x,y;

//get input from the user

cin>>x>>y;

//Call the method to swap the values

SwapValues(&x,&y);

//print their values

cout<<x<<" "<<y;

return 0;

}

<u>Output</u>:

3 8

8 3

Explanation:

<u>Following are the description of the program</u>.

  • Firstly, we define required header file and function 'SwapValues()', pass two pointer type integer variables in argument that is 'userVal1' and 'userVal2'.
  • Set integer data type variable 'z' and initialize the value of 'userVal1' in it, then initialize the value of 'userVal2' in 'userVal1' and then initialize the value of 'z' in 'userVal2'.
  • Finally, define the main method in which we set two integer type variables and get input from the user in it then, call and pass those variables and print it.
6 0
3 years ago
What is the job of a bootloader?
VladimirAG [237]

Answer:

A bootloader, also known as a boot program or bootstrap loader, is a special operating system software that loads into the working memory of a computer after start-up.

Explanation:

6 0
3 years ago
Read 2 more answers
Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
Blizzard [7]
Strings can usually be dealt with as arrays of characters.

sentence[ -1 ]

sentence.substring( sentence.size() -1 );
8 0
3 years ago
Assume that word is a variable of type String that has been assigned a value. Write an expression whose value is a String consis
DerKrebs [107]

Answer:

Follwing is the python code:-

word=str(input("Enter the string\n"))

new=word[0:3] #expression for first three characters of the string.

print(new)

Output:-

Enter the string

chandelier

cha

Explanation:

The expression word[0:3] is for extracting first three characters form the string.

word[0:3] = It extracts characters from index 0 to index 2 it does not include 3.3 is excluded.

7 0
3 years ago
Other questions:
  • Which translator program reads small portions of a program at a time, translating them into machine instructions which are then
    12·1 answer
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • Amazon Web Services (AWS): Group of answer choices a) forms a majority percentage of Amazon's overall revenue. b) was introduced
    15·1 answer
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • Which of these options would likely have a better playback experience in your presentation?
    8·2 answers
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to
    6·1 answer
  • Does digital media play a big role in your life?
    13·1 answer
  • Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​
    5·1 answer
  • Plagiarism is considered
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!