1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
6

Convert the following denary numbers into binary using 8-bit register:

Computers and Technology
1 answer:
Mariana [72]3 years ago
8 0

Answer:

1) 3

2) 5

3) 21

4) 57

5) 76

It would be much more easier if there were a grid containing all the numbers.

You might be interested in
Which type of input devices used in big hero 6 movie
Maslowich

The  Input Devices Used in Movie Big Hero are:

  • A joystick
  • medical robot
  • Armored exoskeleton
  • Jet-boots.

<h3>What are input device?</h3>

This is known to be a is a piece of instrument that helps gives or provide data to any information processing system.

Note that the Input Devices Used in Movie Big Hero “6”  are  a medical robot made by by Tadashi Hamada., Armored exoskeleton and others.

Learn more about input device from

brainly.com/question/24455519

#SPJ1

7 0
2 years ago
A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
spayn [35]

In my opinion, the best solution for the call center company to implement is to enforce time of day restrictions.

D) Time-of-day restrictions.

<u>Explanation:</u>

As the employees of the call-center company work in shifts, it would be the best solution to incorporate time of day restrictions. Each employee has already been allotted a shift, so every employee should only be allowed to log in when their shift is active.

Reduced failed logon attempts, mandatory password changes, and increased account-lockout time are also good practices to incorporate but the performance of the shift will be best monitored when the time of day restrictions are made.

In this way, the company will know who all from the employees are allowed to log in and it will subsequently decrease the traffic as well.

7 0
3 years ago
What does dram stand for?
Sati [7]
Dynamic random-access memory
4 0
3 years ago
Read 2 more answers
Gus wants to select different data for a chart he has made what sequence should he follow
allochka39001 [22]
What do you mean by this?
8 0
4 years ago
Coding with Loops Worksheet
vovangra [49]
Mmmmmmmmmmmmmmmmmmmmmmmm
7 0
3 years ago
Read 2 more answers
Other questions:
  • Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
    7·1 answer
  • 1.
    6·1 answer
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • What is 1 and 3/4 in grams?
    13·2 answers
  • What browser is included with windows?
    7·1 answer
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • int sequence[10] = { 3, 4, 5, 6, 7, 8, 9, 10, 1, 2 }; Write a C++ program to ask the user to enter a number, if the number can b
    10·1 answer
  • How does violating the SOLID principles make code hard to test?
    5·1 answer
  • Each new term in the Fibonacci sequence is generated by adding the previous two terms. By starting with 1 and 2, the first 10 te
    13·1 answer
  • In this lab, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!