1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
4 years ago
12

Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​

Computers and Technology
1 answer:
Serhud [2]4 years ago
3 0

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

You might be interested in
Complex scientific research is usually done using?
garik1379 [7]

Complex scientific research is usually done using A Mainframe Computer.

<h3>What is a Mainframes computer?</h3>

Mainframes are a type of computer that generally are comprehended for their large size, amount of storage, processing power and high level of reliability. They are primarily used by large organizations for mission-critical applications requiring high volumes of data processing. In general, there are a few characteristics of mainframes that are common among all mainframe vendors:

Nearly all mainframes have the ability to run (or host) multiple operating systems. Mainframes can add or hot swap system capacity without disruption. Mainframes are designed to handle very high volume input and output (I/O) and emphasize throughput computing. A single mainframe can replace dozens or even hundreds of smaller servers.

Thus, Mainframe Computer is the answer.

To learn more about   Mainframe Computer click here:

brainly.com/question/14480599

#SPJ1

4 0
2 years ago
True False The explicit location always tells you where users are located when they type the query.
gregori [183]
It's true for only some users
7 0
3 years ago
Read 2 more answers
What will help the programmer understand what’s going on in the program?
Over [174]

Answer:

Programming languages to help solve algorithms

Explanation:

6 0
3 years ago
Problem (Commands): Let c be a copy flag and let a computer system have the set of rights {read, write, execute, append, list, m
dlinn [17]

Answer:

Aee explaination

Explanation:

1.

command copy_all_rights(p,q,s)

if read in a[p,s]

then

enter read into a[q,s];

if write in a[p,s]

then

enter write into a[q,s];

if execute in a[p,s]

then

enter execute into a[q,s];

if append in a[p,s]

then

enter append into a[q,s];

if list in a[p,s]

then

enter list into a[q,s];

if modify in a[p,s]

then

enter modify into a[q,s];

if own in a[p,s]

then

enter own into a[q,s];

end

2.

command copy_all_rights(p,q,s)

if own in a[p,s] and copy in a[p,s]

then

enter own into a[q,s];

if modify in a[p,s] and copy in a[p,s]

then

enter modify into a[q,s];

if list in a[p,s] and copy in a[p,s]

then

enter list into a[q,s];

if append in a[p,s] and copy in a[p,s]

then

enter append into a[q,s];

if execute in a[p,s] and copy in a[p,s]

then

enter execute into a[q,s];

if write in a[p,s] and copy in a[p,s]

then

enter write into a[q,s];

if read in a[p,s] and copy in a[p,s]

then

enter read into a[q,s];

delete copy in a[q,s];

end

3.

"q" would be the effect of copying the copy flag along with the right, because q would have copy right to transfter to another, which may not be intended.

3 0
4 years ago
Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value
Contact [7]

woahhhhhhhhhhhhhhhhhh dude

4 0
4 years ago
Other questions:
  • The ______________ steps through the source code, converting each source code instruction into appropriate machine language foll
    7·1 answer
  • _____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protoc
    11·1 answer
  • Karen is learning about searching the Internet and collaborating with other people online. ​ ​ Karen has found and removed all W
    7·1 answer
  • Processor speed is a measurement of what?
    10·1 answer
  • An investigator has proposed a multi-site study of PSA (Prostate Specific Antigen) test results among patients with prostate can
    6·1 answer
  • HELP!!!<br> THIS HAPPENS EVERY TIME
    6·2 answers
  • Cryptography has requirements include:
    8·1 answer
  • Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as fo
    10·1 answer
  • Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
    14·1 answer
  • True or false<br>Y axis is also known as the value X.​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!