1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
11

The base 10 number 18 is equal to which base 16 number? 10 12 14 16

Computers and Technology
1 answer:
AfilCa [17]3 years ago
3 0

Answer:

1 2 base 16

Explanation:

To convert to base 16 you divide the number with 16. 18/16=1 remainder 2;1 divide by 16 is =1

From bottom to top :1 2

You might be interested in
There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea
Art [367]

Answer:

i dont know

Explanation:

5 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is o
Kobotan [32]

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

<h3>What is a flowchart?</h3>

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

<h3>What is a pseudocode?</h3>

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

Read more on pseudocode here: brainly.com/question/13208346

#SPJ1

8 0
2 years ago
Assume that there are about 60 students in your class. If every student is to be assigned a unique bit pattern, a) what is the m
Arada [10]

Answer:

a) Therefore, the minimum number of bits required is 6.

b) Therefore, we can admit 4 more students to the class without requiring additional bit for each student's unique bit pattern

Explanation:

a) The number of unique bit patterns using <em>n</em> bits is calculated using 2^{n}.

In this case, there are 60 students, so, we need at least 60 unique bit pattern.

2^{n}  = 60

Where <em>n</em> is the number of bit required; we are to find <em>n</em>

We take the logarithm of both side:

log_{2} 2^{n}  = log_{2} 60\\n = log_{2} 60\\n = 6 (Approximately)

Therefore, the minimum number of bits required is 6

b) How many more students can be admitted to the class without requiring additional bits for each student's unique bit pattern?

With 6 bits, we can represent up to 2^{6} unique bit pattern which is 64 unique bit patterns.

To get the number of additional bit:

64 - 60 = 4

Therefore, we can admit 4 more students to the class without requiring additional bit for each student's unique bit pattern

7 0
3 years ago
The von Neumann bottleneck: Question 42 options: A) creates collisions on an I/O bus. B) describes the single processor-memory p
Semmy [17]

Answer:

The answer is "Option B".

Explanation:

It is an output  of the constraint related to the  computer design, which use d by John von Neumann whom has developed the concept of modern design, in which it is a single processing storage method, because the request information and process information are contained in one location, and wrong choices can be described as follows:

  • In option A,  It can't create an I/O bus.
  • In option C, It can't use multiprocessors.
  • In option D, It is wrong because it was invented by John von Neumann.
3 0
3 years ago
Other questions:
  • Devices such as monitors and printers that are connected to a computer are called ________.
    12·1 answer
  • Using functions,
    6·1 answer
  • What's the minimum storage for onedrive e2
    6·1 answer
  • ____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.
    14·1 answer
  • Which of the following represent emerging classes of application software? Check all of the boxes that apply.
    9·3 answers
  • Drag each label to the correct location on the image.
    10·1 answer
  • 1. Write program, WriteData.java, that writes the following data to file books.txt. Include the semicolons. Fiction;Abraham Linc
    11·1 answer
  • Explique dos recursos que necesitan los empresarios para poder poner en práctica sus ideas.
    14·2 answers
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • What file can you edit on a linux system to configure shared folders using samba?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!