1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
2 years ago
15

How do you find binary?

Computers and Technology
1 answer:
trasher [3.6K]2 years ago
3 0

Answer:

To convert integer to binary, start with the integer in question and divide it by 2 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero. Then just write out the remainders in the reverse order.

Explanation:

You might be interested in
Which password is an ideal and secure password?
Serjik [45]
Many individuals try to use passwords that are easy to remember and so may create passwords that are not secure. These types of passwords include numbers in sequence, groups of keys on the keyboard or even the word 'password'. Some individuals use dates such as birthdays or anniversaries. These are very unsafe and can be easily hacked.
A safe and secure password has a mixture of upper and lower case letters, symbols and numbers. A carefully crafted password with any combination of these characters can be safe and also easy to remember.
5 0
3 years ago
Read 2 more answers
What maintains data about various types of objects, events, people, and places?
Whitepunk [10]
Database,A data made management system,data element,
5 0
2 years ago
If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = in
Lesechka [4]

Answer:

Yes

Explanation:

Because all answers are intotal (2)

8 0
3 years ago
Menus are attached to the windows by calling
Lemur [1.5K]

i dont know da answer

4 0
2 years ago
What are some of the potential sources of risk in a systems analysis and design project? How does the project manager cope with
Alexeev081 [22]

Answer:

Project management set of processes for risk management include, for coping with risk the project manager need to do the following:

Risk Planning

Risk Identification

Risk Analysis (Qualitative and Quantitative)

Risk Response Planning

Risk Monitoring and Control

Environmental Risks

External Risks

Design Risks

Engineering Services Risks

Right of Way Risks

Construction Risks

Project Management Risks

Organizational Risks

Other risks are : (article ITToolbox sources of risk)

Customer Risk

technical Risk

Delivery Risk

Explanation:

5 0
2 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • What sugar is used in a DNA molecule​
    7·2 answers
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • Which search engine do you prefer? Why
    15·2 answers
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • You want to send an email to members of your team working on a school project. In which field would you put the email addresses
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!