1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
7

Ewsubject: Computer11101÷101 binary operations​

Computers and Technology
1 answer:
lions [1.4K]3 years ago
5 0
11101 / 101 = 109.9
You might be interested in
Please conduct some research and find an article on Security Threats and please provide link of the article.
finlep [7]

Answer:

There are Security Threats happening every other day in the world. Some are minor while others can catastrophic.

Explanation:

There are also many types of <u>Security Threats</u>, <u>Breaches</u>, and <u>Hacks</u> in the world of IT. Each with their own Security Measures. Below are two links about this topic. The first link is an article about 5 of the worst corporate Security Breaches/Hacks to have taken place. While the second link is an article about the Top 10 Network Security Threats.

https://abcnews.go.com/Technology/marriotts-data-breach-large-largest-worst-corporate-hacks/story?id=59520391

https://securitytrails.com/blog/top-10-common-network-security-threats-explained

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
What types of storage can be used to access your data on another computer?
krok68 [10]

Cloud storage is a major option. There is also a USB stick (Memory Stick) and sometimes a hard drive. But, cloud storage is probably the best option because your info can be accessed from anywhere that had internet connections.

Hope this helps!

5 0
3 years ago
Read 2 more answers
Choose the false statement below. The content that displays in the browser is contained in the head section. The content that di
aivan3 [116]

Answer:

The content that displays in the browser is contained in the head section.

Explanation:

The content that displays in the browser is contained in the head section, this is the false statement because the The HTML head is the contents of the <head> element.

The head's content is not displayed on the page. Instead, the head's job is to contain metadata about the document.

3 0
3 years ago
Why do bats sleep upside down
seraphim [82]

Answer:

Bats cannot run so it would be almost impossible for them to take off from the ground. A major advantage to hanging upside down is that bats do not need to generate lift to begin flight. They just drop out of their bed, open their wings and off they go.

Explanation:

8 0
3 years ago
Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
pantera1 [17]

Answer: Result:Enter the number of quarters in the jar: 4

Enter the number of dimes in the jar: 5

Enter the number of nickels in the jar: 2

Enter the number of pennies in the jar: 5

Total value is 1 dollars and 65 cents

Explanation: import java.util.Scanner;public class Coins { public static void main(String[]args) { int quarters, dimes, nickels, pennies; int total;Scanner scan = new Scanner (System.in);System.out.print("Enter the number of quarters in the jar: "); quarters = scan.nextInt();System.out.print("Enter the number of dimes in the jar: ");dimes = scan.nextInt(); System.out.print("Enter the number of nickels in the jar: ");nickels= scan.nextInt(); System.out.print("Enter the number of pennies in the jar: ");pennies = scan.nextInt(); int total_cents = 25*quarters + dimes*10 + nickels*5 + pennies;total =total_cents/100;total_cents = total_cents %100;System.out.println("Total value is " + total + " dollars and " + total_cents + " cents ");}}

Result:Enter the number of quarters in the jar: 4

Enter the number of dimes in the jar: 5

Enter the number of nickels in the jar: 2

Enter the number of pennies in the jar: 5

Total value is 1 dollars and 65 cents

4 0
3 years ago
Read 2 more answers
Other questions:
  • Create and apply a css class named bigblue, which selects a large, blue-colored font.
    11·1 answer
  • Microsoft Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinec
    6·1 answer
  • An increase in Consumption will ___________ in the Classical Model of Aggregate Demand.
    13·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • What steps should Jeremy take to get himself motivated to study for the test?
    12·2 answers
  • In a Comparative Government course, the first unit focuses on the US Congress and the
    8·1 answer
  • Write a function so that the main program below can be replaced by the simpler code that calls function mph_and_minutes_to_miles
    7·1 answer
  • What is the definition of Overflow Error?
    5·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • True of false that the memory of laptop is normally measured in kilobytes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!