1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
7

Help its in binary and im a small brain for that

Computers and Technology
1 answer:
aksik [14]3 years ago
4 0

The bit on the i-th position from RIGHT to LEFT has a value of 2 to the i (start counting with 0), so,

First one is,

0\cdot2^3+1\cdot2^2+0\cdot2^1+1\cdot2^0=5

The next are thusly,

2,0,6 and 8.

Hope this helps :)

You might be interested in
Explain briefly why we say that the "Web" exists only in our minds.
hammer [34]

Answer:

The Web is the system of web pages and sites that uses the Internet to pass the files across. It was developed in the late 1980’s by Tim Berners-Lee, and you <em>need a Web Browser to access it</em>. This could either be in a PC, a mobile phone or one of the new iPods.

Explanation:

I guess you could look at it as just one of many services that use the Internet – other services include e-mail, internet telephony and peer-to-peer file transfers. Hope this helps ^-^

4 0
3 years ago
On laptops with a smart card reader installed, where is the smart card reader usually located?
muminat

On laptops with a smart card reader installed, where is the smart card reader usually located Under the palm rest

<u>Explanation:</u>

A smart card reader is a design that can scan a card with some kind of barcoding or magnetic strip in it. Some Palmrest construction holds the smart card reader and ribbon cable junction board. Palm rest is frequently placed at the front of your laptop.

Smart card readers are commonly at both ends of the palm rest. It can simply be found on with USB and HDMI ports. Now Palm rest with fingerprint reader, smart card reader, and speaker removal are available.

<u />

<u />

4 0
4 years ago
How does confidentiality protect people and their online activity?
zlopas [31]
The answer is C Explanation: process of elimination
5 0
3 years ago
Peter is explaining the steps to create a fire effect in an image to his class. Help Peter pick the correct word to complete the
Pavel [41]

Answer:

The answer would be "Blending"

Explanation:

I took the test and checked over my answers

4 0
3 years ago
Which information purpose uses video from a security camera?
jarptica [38.1K]

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

7 0
3 years ago
Other questions:
  • What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
    9·1 answer
  • Why is it important to use correct posture while typing
    7·1 answer
  • List three things that scientists learned about earth beginning in the 1800s
    13·1 answer
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
  • Conduct research to determine the best network design to ensure security of internal access while retaining public website avail
    9·1 answer
  • Draw DFD diagram for phone sales. Help me. Thanks
    12·1 answer
  • ***URGENT***
    8·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
  • if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!