1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
6

Convert each of the fo" wing base ten representations to its equivalent binary form a. 6 b. 13 C. d. 18 e. 27

Computers and Technology
1 answer:
asambeis [7]3 years ago
6 0

Answer:

6=110

13=1101

18=10010

27=11011

Explanation:

A decimal number is converted to binary number by constantly dividing the decimal number by 2 till the number becomes zero and then write the remainders in reverse order of obtaining them.Then we will get our binary number.

I will provide you 1 example:-

18/2 = 9   the  remainder =0

9/2 = 4    the remainder =1

4/2 = 2    the remainder =0

2/2 = 1     the remainder =0

1/2 = 0     the remainder =1

Writing the remainder in reverse order 10010 hence it is the binary equivalent of 18.

You might be interested in
Please Help ASAP!!
Maurinko [17]

Answer:

in the page layout view

Explanation:

7 0
3 years ago
Read 2 more answers
This is on zyBooks. Please write the code in C++, please!
poizon [28]

The program is an illustration of built-in functions

<h3>What are built-in functions?</h3>

They are named program statements that have a predefined purpose

<h3>The actual program</h3>

The program written in C++, where comments are used where required is as follows:

#include <iostream>

#include <cmath>

#include <ios>

#include <iomanip>

using namespace std;

int main (){

double x;

double y;

double z;

cin>>x;

cin>>y;

//This calculates the given expression

z = pow(sqrt(y),x);

cout << fixed<<setprecision(2);

cout<<z<<endl;

return 0;

}

Read more about python functions at:

brainly.com/question/14284563

7 0
2 years ago
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked an
Strike441 [17]

Answer:

Option C is the correct option.

Explanation:

When any email or message is received from the FBI in the user's computer system and the following message is about the user's computer system has been locked and they demand some amount to unlock their data or information.

So, the following scenario is about the ransomware because they ransom money to retrieve their data and information from the system.

5 0
3 years ago
Which of the following are examples of structured data?
Burka [1]

Answer:taffif

Explanation:

4 0
3 years ago
How is hashing used?
Aliun [14]

Answer: Its A. used to protect the transmission of software and large files to be downloaded

Explanation: Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file. A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit o...

3 0
3 years ago
Other questions:
  • In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
    10·1 answer
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • "What is the database in which Windows stores all information about hardware, applications, users and system settings?"
    8·1 answer
  • Is the following a true statement in our world? Why or why not?
    13·1 answer
  • what will be the Trade discount and Invoice Amount if the List Price is $400.00 and the Trade Discount Rate is 85%
    14·1 answer
  • While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is
    11·1 answer
  • Which is true regarding pseudocode?
    15·2 answers
  • Which is the correct expansion of the term Internet?
    15·2 answers
  • A program that will ring a bell six times is what kind of program?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!