1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
2 years ago
14

Write a program binary.cpp that reads a positive integer and prints all of its binary digits.

Computers and Technology
1 answer:
earnstyle [38]2 years ago
5 0

Answer:

View image below.

Explanation:

They're just asking you to create a num2bin function on Cpp.

If you search for "num2bin in C", you can find a bunch of answers for this if you think my solution is too confusing.

One way to do it is the way I did it in the picture.

Just copy that function and use it in your program. The rest you can do yourself.

You might be interested in
"You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
SSSSS [86.1K]

Answer:

6 hosts can have IP addresses on the LAN attached to the router interface

Explanation:

Given IP address

=> 192.168.192.10/29

It has a subnet mask of /29 which means it has 3 host bits. This is calculated by subtracting 29 from 32(number of bits in an IPV4)

Since there are 3 host bits,  the total number of possible addresses is given by

=> 2^{3} = 8 possible addresses.

Out of these 8 possible addresses, the first address will be the subnet id and the last address will be the broadcast address.

Therefore, there are only 6 addresses available for the hosts.

<em>Hope this helps!</em>

5 0
3 years ago
Given the following classes and their objects:
Andrej [43]

Answer:

The answer is "Option b"

Explanation:

In the given code three-class C1, C2, and C3 are declared, in which C2  and C3 extend the class C1. In the next line, C2 and C3 object are created, that is c2 and c3. and in the last line c2 class object holds two-class C2, C1, and one object c3 value, this code will give runtime error because it can't cast object from sibling class, and wrong choices can be defined as follows:

  • In option a, It is not correct because it can't cast c3 object into c2 object.
  • In option c, It is not correct because it performs multiple casting in nested forms.
  • In option d, It is wrong because the statement is not correct.
3 0
3 years ago
What would be the purpose of grouping worksheets in a workbook?
Nikolay [14]

Answer: A

Explanation:

3 0
3 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
What is output by the code below?
PSYCHO15rus [73]

Answer: I think it is a

Explanation:Sorry if it it is worng

3 0
3 years ago
Other questions:
  • How might your use of computers and knowledge of technology systems affect your personal and professional success?
    7·2 answers
  • The recommended flux for electrical soldering is A. antimony. B. sal ammoniac. C. rosin. D. muriatic acid.
    9·1 answer
  • On a hard disk each track is divided into invisible wedge-shaped sections called _______
    15·1 answer
  • Susan is keen to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which activ
    15·2 answers
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • Why should computers have a file structure?
    7·2 answers
  • Pie charts are best used for
    5·1 answer
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
  • I hope The characters That I want in Mortal kombat 12 is Lori and peron That’s My character wishlist in The next Mortal kombat g
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!