1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
15

How do you find binary?

Computers and Technology
1 answer:
trasher [3.6K]3 years ago
3 0

Answer:

To convert integer to binary, start with the integer in question and divide it by 2 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero. Then just write out the remainders in the reverse order.

Explanation:

You might be interested in
Describe 6 difference of the types of computer<br>​
Trava [24]

Answer:

<h3>1. Supercomputer</h3>

One of types of computers is supercomputer. It is a computer that is at the front-line of current processing capacity, particularly speed of calculation. It is usually used to do tasks involving intense numerical calculations such as weather forecasting, fluid dynamics, nuclear simulations, theoretical astrophysics, and complex scientific computations

<h3>2. Mainframe Computer</h3>

Another computer type is mainframe computer. It is a computer that is capable of handling and processing very large amounts of data quickly. Its calculation speed can reach millions to tens of millions instructions per second (MIPS) and it can respond to hundreds of millions of users at a time.

This computer type is mainly used in large institutions such as government, banks and large corporations.

<h3>3. Minicomputer (Mid-Range Computer)</h3>

Minicomputers are a class of multi-user computers that lie in the middle range of the computing spectrum, in between the smallest mainframe computers and the largest single-user systems (microcomputers or personal computers).

Minicomputers are usually small in scale, simple in structure, easy to maintain, and low in cost. Therefore, they are often used in universities, scientific research institutions and industrial control fields.

<h3>4. Microcomputer (Personal Computer)</h3>

The term “microcomputer” was introduced with the advent of systems based on single chip microprocessors. In the early days, the microcomputers would still have been too expensive to be owned by a single individual. But in the late 20th century, microcomputers became the most common type of computer.

Therefore, the term "microcomputer" has practically become an anachronism and has been replaced the term "personal computer (PC)".

Personal computer has developed rapidly because of its small size, convenient use, low production cost, and low price. PC computing speed can reach hundreds of thousands to millions instructions per second, which can meet the requirements of data processing and scientific computing in production, scientific research, and life.

<h3>5. Workstation Computer</h3>

A workstation computer is a high-end personal computer between microcomputers and minicomputers. It is usually equipped with large-capacity memory, external storage, and large-screen displays. Therefore, it has strong data processing capabilities and graphics processing capabilities.

Workstation computers are designed and developed mainly for professional application fields like engineering design, animation production, scientific research, software development, financial management, information services, analog simulation, etc.

<h3>6. Server Computer</h3>

A server refers to a high-performance computer that provides shared information resources and various services for many users on the network at the same time in a network environment.

A server is expected to be capable of high-speed computing, long-term reliable operation (it features error-correction of RAM; redundant cooling; self-monitoring, RAID), and powerful external data throughput.

The structure of the server is similar to that of an ordinary computer. Many smaller servers are actually personal computers that have been dedicated to provide services for other computers. But they are very different in terms of processing power, stability, reliability, security, scalability, and manageability.

According to the services provided, server computers can be subdivided into database server, file server, Web server, FTP server, etc.

<h2>hope helpful <3</h2>
4 0
3 years ago
Before you enter an intersection on a green light make sure
mr Goodwill [35]

Answer:

there is no pedestrians and everyone is stopped at their designated red light

5 0
3 years ago
Read 2 more answers
HELP PLZ ;(
Keith_Richards [23]
The answer is B or you could click when the pop up
8 0
3 years ago
Read 2 more answers
What was a result of george washington's belief in the sovereignty of the people instead of monarchy?
Ilya [14]
<span>George Washington's belief in the sovereignty of the people instead of monarchy led him to reject a third term as president.</span>
8 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Other questions:
  • Read the scenario below, then follow the subsequent instructions.
    15·1 answer
  • On the UB-04 claim form, the type of bill is identified by a four-digit numerical code. The first digit is a leading zero, what
    10·1 answer
  • IF YOU ARE COMPUTER MASTER TELL ME WHICH SOFTWARE IS USED IN CALLIGRAPHY
    6·2 answers
  • Multiply 2.7×10^4 by 6.3×10^6​
    13·2 answers
  • You and a few friends are having a meal at a pizza restaurant, and the server has just given you the bill. Write a function that
    14·1 answer
  • When two conductors are accidentally connected it is<br> called a
    6·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA
    14·1 answer
  • Study the original and changed passages.
    8·2 answers
  • :|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|
    5·2 answers
  • Which option correctly identifies if the researcher’s approach was the best start in the following scenario and explains why?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!