1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
8

Design an algorithm to convert a decimal number, n, to binary format?

Computers and Technology
1 answer:
Fudgin [204]3 years ago
8 0

An algorithm that would convert a decimal number n to binary format must have at least 16 commands.

<h3>What is an algorithm?</h3>

An algorithm is a term to refer to a series of sequential instructions that allow actions or programs to be executed. It is an indispensable tool for the digital world because it is the basis for technology.

An example of an algorithm to convert from decimal numbers to binary format would be:

Process Decimal_bin

Define decimal as Integer;

Define binary as Character;

Define modulus as Integer;

Define aux as Integer;

Write 'Enter the decimal number';

Read decimal;

aux<-decimal;

binary<-'';

While decimal>0 Do

 modulus<-decimal MOD 2;

 binary<-Concatenate(ConvertToTex(modulus),binary);

 decimal<-trunc(decimal/2);

FinWhile

Write binary;

EndProcess

Learn more about algorithm in: brainly.com/question/21970419

You might be interested in
18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
Tema [17]

Answer:

If this is a Mac, it's a common problem and there isn't anything to fix it because it's just like that. I reccomend unplugging the computer and NOT signing off. Because of that, that may be why it is the problem for you. I do not know about Windows Computers, but this is some info that applies with all computers.

Explanation:

7 0
4 years ago
Read 2 more answers
Why did NFL equip its players with RDIF tags?
SVEN [57.7K]

NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

<h3>Why did NFL equip it's players with RFID tags?</h3>

This is known to be often done so that it can aid location tracking, a lot of NFL equips each player with a minimum of two RFID tags.

Hence,  NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

Learn more about NFL from

brainly.com/question/15262528

#SPJ1

5 0
2 years ago
Test if the word mold is stored in the variable word. Computer science.
Andre45 [30]

Answer:

word = str("Enter a word: ")

if "mold" in word:

 print("Mold is in the variable word.")

else:

 print("Mold is not in the variable word.")

5 0
3 years ago
1. Web and mobile applications allow users to be actively engaged in an online activity.
anygoal [31]
1. true
2. true
3. D
4. true
5. A
4 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • Write a Java program that generates a random number between 0 and 50. Then, the program prompts for guesses until the user is co
    14·1 answer
  • When an object is instantiated, it receives its own copy of all static variables of the class?
    14·1 answer
  • Implement function translate() that provides a rudimentary translation service. The function input is a dictionary mapping words
    9·1 answer
  • What’s the difference between the logical and physical structure of a file? What are the advantages of not having an application
    15·1 answer
  • Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
    9·1 answer
  • The art element line is a moving point.<br><br><br> True or False
    15·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!