1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
8

How to convert binary number into decimal number​

Computers and Technology
2 answers:
Alecsey [184]3 years ago
6 0

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Liono4ka [1.6K]3 years ago
4 0

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

You might be interested in
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName, and who
never [62]

Answer:

Python Program:

if __name__ == '__main__':

   a = input("Enter Name: ")

   b = a.split()

   print(b[2] + ',' , b[0], b[1][0])

Explanation:

The input function will be used to prompt user to enter the name of the person. The person's name will be stored in variable a.

Let us assume that the user entered a name mentioned in the example, which is Pat Silly Doe, Now variable a = 'Pat Silly Doe'.

The function a.split() is used to split a string into a list. The splitting (by default) is done on the basis of white-space character. Therefore, a.split() will give a list

['Pat', 'Silly', 'Doe']

which will be later on stored in variable b.

We can use the subscript operator [] to access the values in a list. Suppose if we have a list a, then a[i] will give us ith element of a, if i < length of a.

Finally, we print the answer. b[2] will give us the last name of the person. We append a comma using '+' operator. b[0] will give us the first name. b[1] will give us the middle name, but since we only need one character from the middle name, we can use another subscript operator b[1][0] to give us the first character  of the middle name.

Note: Characters of strings can be accessed using subscript operator too.

4 0
3 years ago
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user
Thepotemich [5.8K]

Answer:

Ransomware

Explanation:

commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.

3 0
3 years ago
Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the
Ira Lisetskai [31]

Answer: A. OAuth

Explanation:

OAuth is one of the process by which different applications basically the third party applications can have access to account details of the end users. Here the process is completely governed by the principles of authorization protocols. Similarly in OAuth the access to the details of the end users are maintained by the process of a token. The third party upon access of the token is able to access the end users account information.

OAuth was established in 2007 and works on the framework of the open source federation.

So in this regard IIya would be recommended OAuth technology for her federal system technology.

8 0
3 years ago
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the messag
a_sh-v [17]

Answer:

Algorithm

Explanation:

Algorithm is a set of instructions designed to perform a specific task, an independent sequence of actions to be perform to solve a problem and instruction for performing a computation.

Algorithm is A(n) key set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes.

5 0
3 years ago
Read 2 more answers
Which of the following accurately describes at least one difference between Web 1.0 and Web 2.0?
Nata [24]

Answer:

Option (C) is the correct answer.

Explanation:

The web 1.0 and web 2.0 provides an reciprocal influences to the user between them and website.

Web 2.0 depends on the use of crowdsourcing and on the other hand, web 1.0 does not provide any crowdsourcing. Web 1.0 provides users an important contribution in the field of web development and Web 2.0 not included in a closed approach to the internet.

3 0
3 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • Coloumn1; Criteria1: Average of best three marks (CA); CA&gt;=40
    13·1 answer
  • On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
    12·1 answer
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • Please select the word from the list that best fits the definition
    13·2 answers
  • Given an initialized String variable outfile, write a statement that declares a PrintWriter reference variable named output and
    12·1 answer
  • A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
    15·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Professional communication must be objective,
    8·1 answer
  • List and describe the 3 tasks learners can do in a Technology classroom.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!