1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
12

A.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​

Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
6 0

Answer:

a.1111+1011=2,122

b.1011+1111=2,221

c.1111*1011=1111.1011

d.1110*1101=1011.1111

Explanation:

I think that the answer because this binary calculations it is a perform the solving the solution to the equation

You might be interested in
JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
grandymaker [24]

Answer:

I don't use it but my little brother does and I help him with it.

3 0
3 years ago
Read 2 more answers
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the
serious [3.7K]

Answer:

11: Compiler translates a high level source program into a target equivalent (machine language).

An interpreter implements a virtual machine, the high-level programming language of which is the "machine language." The interpreter reads statements more or less one at a time in that language, and executes them as they go along.

12: One could also consider Java either. A compiler (complicated translator) can create code, which is then executed by a complicated virtual machine (interpreter)

13: A preprocessor is an initial translator which removes comments and white space, and group characters together into tokens such as keywords, identifiers, numbers, and symbols, as well as simple syntactic structure analyses. A compiler uses in-depth analysis and nontrivial transformation.

14: C++ implementations based on the early AT&T compiler created an intermediate program in C rather than assembly language

15: Stack-based language, similar to modern Java compiler byte code

16: A method in which a simple interpreter implementation evolves into building more complex versions until the compiler is built.

17: A compiler which translates byte code into machine language immediately prior to each program execution.

18: Lisp and Prolog

19: TEX and TROFF are one of such compilers that translate high-level document descriptions into laser printer or phototypesetter commands. Query language processors for database systems are also compilers that translate languages such as SQL into primitive file operations.

21: without havin to call multiple tools with command-line tools, You can write an entire program in an IDE.

8 0
3 years ago
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
What is a file and ten examples
crimeas [40]

Answer:

A file is a collection of related electronic information.

<u>Examples</u><u>;</u>

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

{ \sf{dbm \:→database }} \\ { \sf{xls  \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}

5 0
3 years ago
Read 2 more answers
Other questions:
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • Ruth knows the name of a presentation file and the folder it's in, but there are many files in that folder. How can Ruth quickly
    8·1 answer
  • The process of finding the largest and smallest numbers is used frequently in computer applications. Write a C++ program that us
    15·1 answer
  • Which of the following has the honor of the first robot-human handshake in space?
    10·1 answer
  • Just five types of pointing device,list
    13·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • What are some personal reading task examples?
    5·1 answer
  • Qué es una magnitud eléctrica
    12·1 answer
  • A thesaurus is an example of a(n)
    5·2 answers
  • Digital rights include the right to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!