1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
9

Convert decimal number into binary numbers (265)10​

Computers and Technology
1 answer:
Ksenya-84 [330]3 years ago
7 0

Answer:

HELLOOOO

Alr lets start with steps by dividing by 2 again and againn..

265 / 2 = 132 ( rem = 1 )

132 / 2 = 66 ( rem = 0 )

66/2 = 33 ( rem = 0 )

33/2 = 16 ( rem = 1 )

16/2 = 8 ( rem = 0 )

8/2 = 4 ( rem = 0 )

4/2 = 2 ( rem = 0 )

2/2 = 1 ( rem = 0 )

1/2 = 0 ( rem = 1 )

now write all the remainders from bottom to up

100001001

is ur ans :)))

You might be interested in
What is Automation ? Please give an example ?
Tcecarenko [31]

Answer:

Creation/application of technology to deliver goods/services with little human effort.

Explanation:

For example, manufacturing technology produces products without much need of human intervention.

6 0
3 years ago
¿Qué tipo de información deben proteger los sitios de comercio electrónico?​
Ksivusya [100]
Come Estás How are you
4 0
3 years ago
Read 2 more answers
In two to three sentences, define "home row" and explain why it is important.
Dominik [7]

Answer:

Explanation:  The home row is where the FJDKSLA; keys are located and it is important because it helps you memorize other keys and rows and can help you become better at typing

6 0
3 years ago
Read 2 more answers
"Which of the following will help protect against a brute force attack?
Effectus [21]

Answer:

B

Explanation:

A complex and unpredictable password would prove very hard to guess or deduce for any attacker.

3 0
4 years ago
Which shooting games is good for low end PC. CSGO or Valorant?​
aleksandr82 [10.1K]

the best choice would be csgo

6 0
3 years ago
Other questions:
  • Consider the folloeing website URL:http://www.briannasblog.com. What does the "http://" represent?
    11·1 answer
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega
    7·1 answer
  • Michelle has developed a new program for computers. She later fixed an error found in the program. What is the best way for her
    5·1 answer
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total p
    13·1 answer
  • 1. What are the process involved in data processing cycle?​
    11·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
  • at the command prompt, type ls -l myscript and press enter. what permissions does the myscript file have? next, type bash myscri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!