1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
2 years ago
12

Difference between positional and non positional number​

Computers and Technology
1 answer:
Harlamova29_29 [7]2 years ago
6 0

Answer:

In positional number system,

1. each symbol represents different value depending on the position they occupy in a number.

2. In positional number system, each system has a value that relates to the number directly next to it. The total value of a positional number is the total of the resultant value of all positions.

3. Example: 12 can be 1 x 10 + 2 x 1, 10 + 2= 12

whereas in Non-Positional number

1. In non-positional number system, each symbol represents the same value regardless of its position

2. In non-positional number system each symbol represents a number with its own place value.

3. Example: Roman number system where I for 1, II for 2 etc.

hope this helps~✨

You might be interested in
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
Analyze the problem statement. Select the correct answer. Vision: We want to decrease errors in our billings to clients. Issue:
finlep [7]

Answer: This problem statement does not provide a useful issue statement.

3 0
2 years ago
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
The set of coordinating colors applied to backgrounds, objects, and text in a presentation is called:
Sonja [21]

Answer:

theme colors

Explanation:

As said, a group of colors that are used to format text and objects in a document. When you open the Color menu, these colors determine what you see.

3 0
2 years ago
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
Other questions:
  • Consider the following scheduling problem. You are given a list of final exams F1,...,Fk tobescheduled,andalistofstudentsS1,...,
    10·1 answer
  • If your network subnet mask is /16, what is the maximum number of host ids available for this network?
    15·1 answer
  • Help! live preview in brackets is not working
    8·1 answer
  • Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
    8·1 answer
  • 3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk
    11·1 answer
  • What does the clone tile command do?
    15·2 answers
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
    11·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!