Binary 10110 into oct & hex Binary 10001 into oct & hex with full process​

Answers

Answer 1

Answer:

yes binary 10001into oct hex with full process.


Related Questions

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

full form of ip ........?​

Answers

internet protocol - hope this helps!

Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called a. Internet b. Scanner c. Printer d. Notebook computer​

Answers

Explanation:

portable computer also known as laptop computer weighting between 4 to 10 pounds is called a Notebook computer.

What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.

Answers

Answer:

While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.

I'm assuming that's A

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Sophie often makes grammatical errors in her document. Which feature of the Spelling and Grammar tool can she use to understand the errors? A. Next Sentence B. Options C. Change D. Explain

Answers

Answer:

D. Explain

Explanation:

Sophie would need an explanation of why she makes grammatical errors to understand the errors.  

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

What method is used to prevent the random number generator from always starting with the same number?

seed()

random()

randint()

initialize()

Answers

Answer:

seed()

Explanation:

Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.

Hope this helps!

Answer:

the answer is seed()

Explanation:

i took the assignment

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20

Answers

Answer:

what?

Explanation:

What is the process of planning, designing, and implementing change requests?


_____ is the process of planning, designing, and implementing change requests.

Answers

Answer:

Change Management

Explanation:

The described process is formally known as Change Management

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

Which of these is NOT a user interface?

A. Graphical user
B. Command line
C. Icon interface
D. Menu driven​

Answers

Answer:

menu driven is not an interface

Explanation:

hope that helps you

please follow

please mark brainliest

I will follow you if you mark me brainliest

Which of these is NOT a user interface?

Choose: B. Command line

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen.
Which of the following multiple display options would be BEST to select when teaching?
A. Show only on 1.
B. Extend these displays.
C. Show only on 2.
D. Duplicate these displays.

Answers

Answer:

Duplicate these displays.

Explanation:

A. Show only on 1 displays only the first screen and disconnects the second one

B. Extend these displays displays two different outputs on the same computer

C. Show only on 2. displays only the second screen and disconnects the first one

D. Duplicate these displays. displays the same output for both screen

Answer:d. Duplicate these displays

Explanation:

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan

Answers

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

Are all the computer users known as programmer ​

Answers

Answer:

Nope

Explanation:

programmers are diff

there are 9 CTSOs, name 3

Answers

Bjhfjjhhuuhhggghhhhhh
Business Professionals of America.
DECA.
Family, Career and Community Leaders of America.

explain about third generation of computer​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

Other Questions
What can differentiate between multiple layers of the ocean floor?sonarmagnetic imagingx-rayseismic reflection Inverse property of addition for real numbers Blackwell, Inc. has a $125,000 liability it must pay five years from today. The company is opening a savings account so that the entire amount will be available when this debt needs to be paid. The plan is to make an initial deposit today and then deposit an additional $30,000 each year for the next three years, starting one year from today. The account pays a 5 percent rate of return. How much does the firm need to deposit today Which of the following cell membranes is the most fluid?Membrane A, because it is composed of saturated fatty acids that have one or more cis bonds that form stable aggregationsMembrane A, because it is composed of saturated fatty acids that lack weak hydrogen bonds that continually break and reform to permit macromolecule movementMembrane B, because is it composed of unsaturated fatty acids that form weak covalent bonds at the site of their cis bonds, which permit easy movementMembrane B, because it is composed of unsaturated fatty acids that have one or more bends, which prevent tight packing The recursive formula for a geometric sequence is: a = 4 an=an-13 What is the 3rd term of this sequence? A square and a rectangle have the same area. If the dimensions of the rectangle are 4 ft by 16 ft, how long is a side of the square? The development of nation-states began Caitlin wants to determine if a tomato plant grows better in potting soil or dirt. Which of the following describes the best set up to conduct this type of investigation? You roll a six-sided number cube and flip a coin. What is the probability of rolling a number greater than 1 and flipping heads? Write your answer as a fraction in simplest form. Suppose we have a stick of length 1.a) We randomly uniformly choose a point and break the stick into two pieces.Find the expected length of the smaller piece.b) We randomly uniformly choose two points (independently) and break thestick into three pieces. Find the probability that the three resulting piecescan be arranged to form a triangle (i.e. all triangle inequalities are satisfied;i.e no piece is longer than the sum of the other two). 15. Assuming the fluorescence threshold is set to be 1. Which gene has the highest gene expression rate? What is the Ct value? Gene with highest expression = ______________ Ct value = _______________ Pure mathematicsssss please please please answer!! will give brainliest and extra points! Why Valuable medicinal herbs are found in mountain region? PLS HELP ASAP! 20 PTSevaluate . ...................... river that originates in Himachal Pradesh reaches the Thar desert. Ganga Sindhu The Ghaggar SOMEONE PLEASE HELP ME ITS URGENT (PICTURE) Imagine you are going to conduct a research project based on this excerpt. Which research question is the most effective for this topic?A. What grievances, complaints, and injustices did the womens rights activists at the Seneca Falls Convention include in A Declaration of Sentiments when they wrote it in 1848?B. How did suffragettes work to obtain the rights outlined in the Seneca Falls Declaration of Sentiments?C. Did any other womens rights conventions occur in 1848?D. How has A Declaration of Sentiments affected America? Which ancient civilization was an ancestor of the Hopi and Pueblo tribes?A. AztecB. Mound BuildersC. AnasaziD. Maya My neighbours.....loud music all night, so I......much sleep.a. were playing / didn't getb.played / weren't getc.was playing / got d.were played / gete.were played / go