1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
8

Convot the following biliary number into decimal form using any method ? (1010.100)2

Computers and Technology
1 answer:
Temka [501]3 years ago
3 0

Answer:

10.5

Explanation:

1010.1

Handy method you can find searching google images, and I originally learned

from some guy teaching an online java course.

.1 --> 1 * 2^(-1) = 0.5

0 --> 0 * 2^(0) = 0

1 --> 1 * 2^(1) = 2

0 --> 0 * 2^(2) = 0

1 --> 1 * 2^(3) = 8

0.5 + 2 + 8 = 10.5

If for some reason it isn't very clear, just take the number, (x) and multiply it

by two to the power of the position it is in. (e.g. first number before decimal point is 0, second 1, etc).

You might be interested in
Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
katen-ka-za [31]
I believe it’s B)LAN

Explanation:
A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources. For example, a LAN may connect all the computers in an office building, school, or hospital. Typically, LANs are privately owned and managed.
4 0
2 years ago
Enna always says thank you when people give her gifts. She even writes thank-you cards. On holidays, Enna remembers
Mashcka [7]

Answer:

trait

Explanation:

7 0
3 years ago
You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
Sidana [21]

Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question

answer:

/23 /26 /27 /28   option A

Explanation:

<u>Breakdown of the last four subnet masks given to the subnets </u>

For the subnet of 500 production host the mask = /23 which will produce 512 hosts

For the subnet of 60 sales host the mask = /26 which will produce 64 hosts

For the subnet of  12 host the mask = /27 which will produce 32 hosts

For the subnet of 30 hosts the mask = /28 which will produce 16 hosts

4 0
3 years ago
Suppose that you want to write a program that inputs customer data and displays a summary of the number of customers who owe mor
Allushta [10]

Answer:

The correct option is D = regionNumber

Explanation:

In this scenario we want to know customers who owe more than $1000 each, in each of 12 sales regions. And the customer data variables include name, zip-code, balanceDue and regionNumber; based on the customer data variables names and zip-code will not really affect our output. It is based on balanceDue that we increment the number of customer owing in a particular region (regionNumber).

Therefore, we would add 1 to an array element whose subscript would be represented by regionNumber since we are interested to know the number of customer owing in each of the 12 sales regions.

3 0
3 years ago
The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data
blagie [28]

Answer:

C.<em> improve data quality and reduce redundancies, reduce increased and staggering storage management costs</em>

<em></em>

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

6 0
3 years ago
Other questions:
  • Kurt is editing a table in his powerpoint that displays accounting formulas and when to use them. he wants to remove the table s
    15·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • Where should you click to edit an existing formula?
    12·2 answers
  • Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
    8·1 answer
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • What is another term for accountability?
    7·2 answers
  • A _________ is automatically launched by some trigger and appears in front of the active window
    12·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • What areas do you need to grow your knowledge in to understand your financial future?
    12·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!