1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
9

How to convert binary to decimal Please it’s so hard and what is digital and analogue

Computers and Technology
1 answer:
geniusboy [140]3 years ago
8 0

Answer:

How to convert binary to decimal ?

It consists of digits from 0 to 9. Binary to decimal conversion can be done in the simplest way by adding the products of each binary digit with its weight (which is of the form - binary digit × 2 raised to a power of the position of the digit) starting from the right-most digit which has a weight of 20.

what is digital and analogue?

In analog technology, a wave is recorded or used in its original form. So, for example, in an analog tape recorder, a signal is taken straight from the microphone and laid onto tape.In digital technology, the analog wave is sampled at some interval, and then turned into numbers that are stored in the digital device.

You might be interested in
The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
krok68 [10]

This type of infection is this a characteristic of a computer worm

For better understanding, lets explain what computer Worms means.

  • Computer Worm are commonly referred to as an independent program that often replicates or double itself by copying a fraction of itself onto another computer. They often exit in two forms. They are:

  1. Network Worm is a type of computer worm that replicates or copies different fraction of itself to computers linked together in known network.
  2. Host Worm is a type of computer worm that replicates or copies itself to another computer in a network and later on remove or deletes itself completely from the previous computer in which it was in.
  • Computer worm are capable of replicating themselves without human intervention.

Learn more about computer worm from

brainly.com/question/19631265

4 0
3 years ago
A ________ record is a resource record that allows other servers to deliver Internet mail using SMTP.
Novay_Z [31]

The resource record that allows other servers to deliver Internet mail using SMTP is called; Mail Exchanger (MX)

<h3>Use of Mail Exchanger </h3>

The correct answer to the blank part of the question is "Mail Exchanger(MX)". This is because a mail exchanger record is simply an MX record that identifies the mail server that has the responsibility of accepting email messages on behalf of a domain name.

Now this Mail Exchanger also operates by allowing other servers to deliver Internet mail with the aid of SMTP(Simple mail transfer protocol)

Read more about SMTP at; brainly.com/question/14568877

4 0
2 years ago
Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
lisabon 2012 [21]

Answer:

It is not possible.

Explanation:

In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.

For this request just we have /22 IPv4 address blocks, this mean

22 red bits 11111111111111111111110000000000 <--- 10 host bits

We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.

Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.

25 red bits 11111111111111111111111110000000 7 host bits

In this case, we need more than 260 computers, but just we have 7 bits, this means.

2^7 = 128 and just one customer needs 260, for that is impossible.

7 0
3 years ago
Which of the following is not an Operating System? Select one:
harina [27]
Internet Explorer is not an Operating System. Internet Explorer is a web browser.
6 0
3 years ago
Which connector USB devices that require 5V or 12 V of power? (Choices in picture)
dexar [7]

Answer:

b

Explanation:

becasuse its p1

8 0
3 years ago
Other questions:
  • Jim has downloaded, installed, and is running too many programs simultaneously. At what pace will his computer be performing?
    9·1 answer
  • Each warning label must contain this element and its purpose is to provide a visual alert to users to the chemical hazards to wh
    14·2 answers
  • Ip addresses and their corresponding domain names are used to identify computers available through the internet.
    15·1 answer
  • I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
    13·1 answer
  • In excel, dates are _____-aligned in the cell by default, regardless of date format.
    8·1 answer
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • A _____ is inserted so that a portion of a document that can have different formatting from the rest of the document. a. heading
    9·1 answer
  • A certain manager makes the following statement "Our internet company is in business for the money, making profits, and making t
    13·1 answer
  • Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki
    14·1 answer
  • Which trait can be a positive or negative?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!