1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gavmur [86]
3 years ago
6

Convert the following denary numbers into binary using 8-bit register:

Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
7 0

Answer:

9LA+ªÿ

Explanation:

You might be interested in
PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
anyanavicka [17]

1. C

2. B

3. C

4. A

5. A

6. B

7. C

8. D

9. C

10. B

11. D

12. D

13. D

14. A

15. A

16. B

17. A

18. B

19. D

20. B


Some of the ones towards the start may not be right but I gave it a go :)





8 0
3 years ago
The benefit from dividing code into methods known as ________ is gained as follows: After you write code to perform a task once,
Fynjy0 [20]

Answer: B: Divide and Conquer

Explanation:

7 0
3 years ago
Write an efficient C++ function that takes any integer value i and returns 2^i ,as a long value. Your function should not multip
Ilya [14]

Answer:

long power(int i)

{

   return pow(2,i);

}

Explanation:

The above written function is in C++.It does not uses loop.It's return type is long.It uses the function pow that is present in the math library of the c++.It takes two arguments return the result as first argument raised to the power of second.

for ex:-

pow(3,2);

It means 3^2 and it will return 9.

4 0
3 years ago
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
salantis [7]
The correct answer is letter b
8 0
3 years ago
Read 2 more answers
"______" is a wireless local network that uses high frequency radio signals to transmit an Internet signal from a wireless route
Hitman42 [59]

Answer:

Modem possibly

6 0
4 years ago
Other questions:
  • The ____ operation is used to add an element onto the stack.
    15·1 answer
  • Write a function, factors, that takes an integer n, and returns a list of values that are the positive divisors of n. Note: 0 is
    13·1 answer
  • You have users who connect to the corporate network using their laptops. because these computers often access confidential data,
    9·1 answer
  • What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
    12·1 answer
  • With microprocessors, The integration of a whole _____ onto a single chip or on a few chips greatly reduced the cost of processi
    14·1 answer
  • A(n) __________ describes a set of well-defined logical steps that must be taken to perform a task
    5·1 answer
  • Fill in each blank with the correct step from the fetch-execute cycle.
    14·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
  • Help plz, u just gotta select all that apply :)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!