1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
9

Convert decimal number into binary numbers (265)10​

Computers and Technology
1 answer:
Ksenya-84 [330]3 years ago
7 0

Answer:

HELLOOOO

Alr lets start with steps by dividing by 2 again and againn..

265 / 2 = 132 ( rem = 1 )

132 / 2 = 66 ( rem = 0 )

66/2 = 33 ( rem = 0 )

33/2 = 16 ( rem = 1 )

16/2 = 8 ( rem = 0 )

8/2 = 4 ( rem = 0 )

4/2 = 2 ( rem = 0 )

2/2 = 1 ( rem = 0 )

1/2 = 0 ( rem = 1 )

now write all the remainders from bottom to up

100001001

is ur ans :)))

You might be interested in
Nowadays, most online discussion boards are on Web-based forums that provide a variety of user-friendly tools to create and post
Katyanochek1 [597]

Answer:

The correct answer to the following question is option e.) Usenet.

Explanation:

Usenet - it  is a collection of the user-submitted messages or notes on the various subject that posted to the servers on the worldwide network. Each of the subject collection of notes is known as newsgroups. There are thousands of the newsgroups which is possible for us to form the new one.

It works like the decentralized computer network which allows us to download our required files. We can also download and access the binary files along with the text post.

5 0
4 years ago
Why are the central processing unit (cpu) and motherboard considered the brain and heart of a computer? do you think these are g
kupik [55]
I think that they are sufficient analogies. But, the heart allows the organs to remain healthy and active. The motherboard does not fully fit that classification. The motherboard would be more like the spinal cord or nerves.
8 0
3 years ago
One of your suppliers has recently been in the news. Workers complain of long hours, hot and stuffy workrooms, poor lighting, an
Alex73 [517]

Answer: sweatshop

Explanation

7 0
3 years ago
Vector images generally do not permit fonts <br><br> True or False
frosja888 [35]

Answer:

false

Explanation:

You can use fonts on a majority of programs

7 0
3 years ago
WRITE IN YOUR OWN WORDS:
MrRa [10]

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

5 0
3 years ago
Other questions:
  • Which is NOT a way the network operating sys-
    6·1 answer
  • What is the difference between a router and a modem
    15·1 answer
  • What is the most common way for computing systems and devices to authenticate a person’s identity? citi
    10·1 answer
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
    9·1 answer
  • 1. Before operating any power tool, you need to
    14·1 answer
  • Which of these file formats would you choose if you had to create a very small and compact raster image for a website?
    11·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!