1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
15

Q1) Convert the decimal number 67 to binary?​

Computers and Technology
1 answer:
Mashutka [201]3 years ago
4 0

Answer:

1000011

Explanation:

You might be interested in
DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
Elina [12.6K]

Answer:

False

Explanation:

DSL(Digital Subscriber Line) :-It is a technology in which user gets high bandwidth connection over ordinary telephone lines.

This technique uses data modulation to achieve higher throughput over the telephone lines.Telephone lines carry voice signals over a small range of frequencies between 300 and 3300 Hz. So the frequencies that are higher are unused and available for data transfer.

DSL connection uses a modulation technique based on amplitude or phase modulation. With the help of modulation techniques DSL uses these unused higher frequencies.It uses frequency range higher than 300 to 3300 hz.

5 0
4 years ago
Write a client program ClientSorting2 and in the main() method: 1. Write a modified version of the selection sort algorithm (Sel
TEA [102]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

 public static void SelectionSorter(String[] my_array){

     System.out.print("\nAfter sort: ");

     for (int ind=0; ind < 22; ind++ ){

         int min = ind;

         for (int k=ind+1; k < 23; k++ )

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

         String temp = my_array[ind];

         my_array[ind] = my_array[min];

         my_array[min] = temp;    }

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String [] myarray = new String [23];

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

 System.out.print("Before sort: ");

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

 SelectionSorter(myarray);

}

}

Explanation:

This defines the function

 public static void SelectionSorter(String[] my_array){

This prints the header for After sort

     System.out.print("\nAfter sort: ");

This iterates through the array

     for (int ind=0; ind < 22; ind++ ){

This initializes the minimum index to the current index

         int min = ind;

This iterates from current index to the last index of the array

         for (int k=ind+1; k < 23; k++ )

This compares the current array element with another

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

If the next array element is smaller than the current, the elements are swapped

<em>          String temp = my_array[ind];</em>

<em>          my_array[ind] = my_array[min];</em>

<em>          my_array[min] = temp;    }</em>

This iterates through the sorted array and print each array element

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares the array

 String [] myarray = new String [23];

This gets input for the array elements

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

This prints the header Before sort

 System.out.print("Before sort: ");

This iterates through the array elements and print them unsorted

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

This calls the function to sort the array

 SelectionSorter(myarray);

}

}

3 0
3 years ago
Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What i
VikaD [51]

The name of the operating system Jazmine is setting up is option A: Client  operating system.

<h3>What  is the operating system running in virtual machines?</h3>

A guest or client operating system is known to be the operating system that one can installed on a virtual machine (VM) or on any kind of partitioned disk.

Hence, the name of the operating system Jazmine is setting up is option A: Client  operating system.

Learn more about operating system from

brainly.com/question/22811693

#SPJ1

3 0
2 years ago
Ssl/tls provides security ________. a. between the sender and his or her e-mail server b. all the way between the sender and the
Brrunno [24]
SSL <span>stands for Secure Sockets Layer and TLS stands for </span>its<span> successor Transport Layer </span>Security. They are protocols responsible for encryption and authentication and are  application-layer protocols. SSL/TLS provides security all the way between the sender and the receiver, which means also between the sender and his or her e-mail server . Correct answer: c. both a and b.
7 0
3 years ago
1. In the canonical form ,the no of variables is?
andrey2020 [161]

The canonical form of a positive integer in decimal representation is a A finite sequence of digits that does not start with zero. More generally, for a class of things on which an equivalence relation is defined, a ecclesiastical form consists in the choice of a specific object in each class.

<h3>What is inequality constraints?</h3>

Number of inequality constraints: While there is a restriction on the number of separate equality constraints, there is no restriction on the digit of inequality constraints.

<h3>What is equality and inequality constraints?</h3>

Terminology. If an inequality constraint holds with equivalency at the optimal point, the constraint is said to be binding, as the issue cannot be varied in the direction of the constraint even though doing so would enhance the value of the objective function.

To learn more about  canonical form, refer

brainly.com/question/14398127

#SPJ9

8 0
2 years ago
Other questions:
  • A device that is used to convert handwriting to text on a computer screen is a(n) _____.
    11·3 answers
  • Melissa and Sue want to distribute a document to be discussed at a meeting starting in about thirty minutes. People will be atte
    14·1 answer
  • Orphan record example?
    8·1 answer
  • 2. Write a program with a function that accepts a string as an argument and returns a copy of the string with the first characte
    11·1 answer
  • Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
    5·1 answer
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • What is a phone made out of dna
    15·1 answer
  • Write a C++ line of code to declare a variable of type “double” that signifies the average of student grades, then initialize th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!