1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
2 years ago
7

Question No. 5:

Computers and Technology
1 answer:
Mkey [24]2 years ago
8 0

Answer:

The answers are:

a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2

Explanation:

<u>a. (1001111) 2 = ( ) 10</u>

In order to convert a base 2 number to base 10 number system the place values are used.

the procedure is as follows:

(1001111)_2\\=(1*2^6)+(0*2^5)+(0*2^4)+(1*2^3)+(1*2^2)+(1*2^1)+(1*2^0)\\=(1*64)+(0*32)+(0*16)+(1*8)+(1*4)+(1*2)+(1*1)\\=64+0+0+8+4+2+1\\=79

<u>b) (11000001) 2 = ( ) 16</u>

In order to convert a base 2 number into base 16, group of 4-bits are made starting from right to left

The groups from the given number are:

1100 0001

Then the groups are changed in to decimal/hexa

So,

(1100)_2 = (1*2^3)+(1*2^2)+(0*2^1)+(0*2^0)\\=(1*8)+(1*4)+(0*2)+(0*1)\\=8+4+0+0=12=C\\\\0001=1

Writing in the same order in which groups were:

(C1)_{16}

<u>c) (E16) 16 = ( ) 10</u>

(E16)_{16}\\=(E*16^2)+(1*16^1)+(6*16^0)\\=(E*256)+(1*16)+(6*1)\\=3584+16+6\\=3606

<u>d) (56) 10 = ( ) 16</u>

Dividing by 16 and noting remainders

16        56

           3 - 8

So,

The number in base 16 is 38

<u>e) (63) 10 = ( ) 2</u>

Dividing by 2

2         63

2         31 - 1

2         15 - 1

2          7 -  1

2          3 -  1

            1 - 1

So the  number after converting in base 2 is:

111111

Hence,

The answers are:

a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2

You might be interested in
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
MakcuM [25]

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment

Two factors may interfere with the copper cabling and result in signal distortion and data corruption are :

EMI

RFI

Explanation:

  • EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • During EMC testing, radiated emissions measurements are made using a spectrum analyzer and or an EMI receiver and a suitable measuring antenna.
  • EMI (Electromagnetic Interference) is also called RFI (Radio Frequency Interference).
  • Conducted RFI is unwanted high frequencies that ride on the AC wave form. Radiated RFI is emitted through the air. There are many pieces of equipment that can generate RFI, variable frequency drives included.
  • The internal circuits of personal computers generate EM fields in the RF range.
3 0
3 years ago
Which blog had legal content and is written mostly by lawyers
Svetradugi [14.3K]
Is it asking for a web site like .edu? or something like that?
6 0
3 years ago
Read 2 more answers
Step into the year 2028. How are people viewing digital video? Or have we moved on to a completely new format?
WINSTONCH [101]

In the year 2028 I don't believe our digital video viewing experience would change too much considering most, if not all, the population is already satisfied with how easy, simple, and versatile our current experience is. If everything changes one thing will for sure remain unchanged. That one thing is cinemas, I don't think cinemas will ever change much as they provide a constant source of revenue while providing a place for family and friends to get together to watch a movie before it becomes available to other sources.


8 0
3 years ago
Because of the relative ease of developing new operating systems, a company with significant market power, such as Microsoft, ma
Snezhnost [94]

Answer: this is an example of a contestable market

Explanation: The theory of contestable markets is associated with the American economist William Baumol. In essence, a contestable market is one with zero entry and exit costs. This means there are no barriers to entry and no barriers to exit, such as sunk costs and contractual agreements.  In this case due the competition Microsoft may charge less for    their product so the barrier's trend is to go down.

3 0
3 years ago
Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they'r
egoroff_w [7]

Answer:

C

Explanation:

Predicate methods typically test a condition and do not modify the object on which they're called.

3 0
3 years ago
Other questions:
  • Ninety-two percent of the new information was stored on magnetic media, mostly in _____.
    11·1 answer
  • Which of the following is the best definition of being a “digital citizen”?
    6·2 answers
  • What tasks do most operating systems perform?
    15·1 answer
  • If we collect data on the number of wins each team in the NFL had during the 2011-12 season, we have _____________ data.
    10·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • How do i work on code with someone else? i use visual studio code. me and a friend wanna make a game together with code. how do
    8·1 answer
  • Question #5
    14·1 answer
  • Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the in
    14·1 answer
  • Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
    9·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!