1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
8

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101

. What is the decimal value of the host portion of the address?
Computers and Technology
1 answer:
QveST [7]3 years ago
8 0

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

You might be interested in
What is the answer and why?
Tanya [424]

Answer:

this.a = a;

Explanation:

YourClass inherits the variable a, so it is available for declaration.

Also, all other replies are meaningless.

8 0
3 years ago
The…..executed simple
Lina20 [59]

Answer:

ok ok

Explanation:

7 0
2 years ago
Read 2 more answers
There is a simple pattern for derermining if a binary number is odd. What is it and why does this pattern occur?
g100num [7]
If a binary number ends in 0 it is even, and if it ends in 1 it is odd. The last spot is the one's place. All the other places are multiples of two, so only if there is a 1 added to the end would it be odd.
5 0
2 years ago
One purpose of the dual ignition system on an aircraft engine is to provide for?
Gnom [1K]
It is done to provide for better engine performance. It is important for two main reasons. One is that if one ignition system fails the other can for a time take care of it and hold its ground until you land or fix it. Another is that it is used for more efficient consumption of fuel and air which makes the engine work better.
7 0
3 years ago
Read 2 more answers
A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to
hammer [34]
<h2>Please wait until more research is discovered...</h2>

Question

A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to be reduced by p%.

To accomplish this, the management decided to keep the height of the candy bar the same, and reduce the length and width by the same amount.

For example, if l = 12, w = 7, h = 3, and p = 10, then the new dimension of the candy bar is 11.39 x 6.64 x 3.

Below is an example of how the completed program should work:

Enter the length, width, and height of the candy bar separated by space(s): 12 7 3

Enter the amount of the reduced volume as a percentage: 10

The new dimensions of the candy bar is: 11.38 x 6.64 x 3.00

Format your output with setprecision(2) to ensure the proper number of decimals for testing!

7 0
3 years ago
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of proble
    9·1 answer
  • The unique physical address burned into every network interface card is its:
    15·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.
    15·1 answer
  • Does anyone have the GCSE 2018 Design Technology J310/01 practice paper?
    15·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • What are registers in ICT used for?
    5·1 answer
  • Please please help I don’t understand
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!