Convert to different number system as mentioned.(17)10=(?)2​

Answers

Answer 1
“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

Related Questions

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

John wants to assign a value to the favorite sport variable:

favoriteSport = indoor soccer

However, he gets an error message. What does he need to change in order to make the code work?


Add a space between the words in the variable name

Create a longer variable name

Put quotation marks around the string literal

Omit the symbol in the string

Answers

Put quotation marks around the string literal

Jon wants to assign a value to the favorite sport variable: favoriteSport! = "indoor soccer" but gets an error message by Removing the exclamation mark from the variable name it will fix for the code to work.

In laptop programming, code refers back to the set of instructions, or a machine of rules, written in a selected programming language (i.e., the supply code).

If you've got ever observed an exclamation mark (!) earlier than the variable in a person's JavaScript code the negation operator (!) definitely simply reverses the means of its operand. ! is the logical now no longer operator in javascript.

Learn more about the javascript here:

brainly.com/question/27683041

#SPJ3

A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable for at least an eight-hour window as part of the response and recovery controls implemented. Which redundancy effort should be put in place to ensure the data remains available?

Answers

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

what is an example of analog device​

Answers

Explanation:

Thermometer. Speedometer. Analogue Clock. Seismometer. Voltmeter. Flight Simulators.

hope it helps

stay safe healthy and happy...

Which command entered without arguments is used to display a list of processes running in the current shell

Answers

Answer:

ps

Explanation:

In Unix and Unix-like operating system, the command used to display the list of processes running in the current shell is ps. For each of these processes, the following details are displayed;

i. PID which indicates the id of the process

ii. TTY which indicates the type of terminal from which the process is running.

iii. TIME which represents the CPU time consumed by the the process and its sub-processes.

iv. CMD which represents the command that runs as the current process.

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

Answers

Answer:

corporate network

Explanation:

A level 3 security system focuses on protecting the corporate network against intrusion, denial-of-service attacks, and unauthorized access.

Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is the most efficient and effective search strategy to identify subject terms for a database search

Answers

Group of answer choices.

a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.

Answer:

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.

In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.

However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.

please answer me fast ​

Answers

Answer:

Btp

Explanation:

this will help you more

Answer:

BTP is the simplest and the most conventional model of topology

PTP

BTP✓✓✓

PTB

PTT

Popular mixed drinks such as margaritas

contain more alcohol than a standard drink.

A. will

B. do not necessarily

O C. never

Drugs

the chemistry of the brain and the way that a person thinks.

A. change

B. don't change

C. trick

Highway Safety Administration

Answers

Answer:

C.never and A.change that's what I think

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

The method of distributing multimedia files, such as an audio file, for downloading onto a personal computer is called

Answers

Answer:

digital distribution

Explanation:

the condition for meeting future enables you to apply formatting to the cells which satisfy a particular condition true or false​

Answers

Answer:

True

Explanation:

Conditional formatting feature available in several spread sheet applications is a feature that allows users to apply the type of formatting they want to cells, such that the content of the formatted cells are displayed in a manner that meets a given specific criteria

Which command in the Linux terminal enables you to find out information about a wireless network adapter comptia

Answers

Answer:

The command is iwconfig (or ifconfig)

Explanation:

To analyze a wireless network adapter in the Linux Terminal, the command you like to use is iwconfig (or ifconfig).

In windows, Ipconfig carrying out a similar function.  It is important to note that iwconfig does not work in OS X, however, ifconfig does.

The Linux terminal is an app (that has a simple command-line interface). It performs the function of allowing a user to:

takes commands from the user, and displays the output on the screen or monitor.

Cheers

A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.

Answers

Answer:

The correct answer is "Cave automatic virtual environment ".

Explanation:

An interactive virtual setting composed of something like a VR chamber or space throughout the cube form wherein the projection displays represent the boundaries as well as flooring, is determined as Cave automatic virtual environment.This same client computer does have a Virtual reality headset as well as header projection but instead uses devices like walls etc.

 

Why are peripherals added to computers?
to limit their applications
to change their purpose
to expand their capabilities
to specify their functions

Answers

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

Why is it important to ensure that your software is up to date?

Answers

Explanation:

It is important to ensure that your software is up to date simply because these updates often provide critical patches to security issues. These patches are to terminate any bugs or exploits that may cause harm to your computer system, and even your personal data. Updating your software allows the program to remove old outdated features, while installing newer/better features. They will often improve the stability and preformance as well.

Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​

Answers

Answer:

ok what is the question supposed to be ?

Edit : nvm i got what you were saying ...

Sherbet and Ices – made from fruit juices, water and sugar. American sherbet contains milk and cream and sometimes egg white.

When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

Answers

Answer:

Screen resolution

Explanation:

The brightness of the words and pictures displayed on computer screen is referred to as screen resolution. Items seem crisper at larger resolutions, such as 1600 x 1200 pixels. They also seem smaller, allowing for more objects to be displayed on the screen. The greater the resolution supported by a display, the larger it is.

what is microsoft speadsheet

Answers

Answer:

Exel if I spelled it right

Explanation: It is very good

Answer:

It's called Excel and it's in Office 365

Explanation:

It's very useful in my opinion to organize any graphs or information you would like to store online.

Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<

Answers

Answer:

1. Software de aplicación: Microsoft Word.

2. Software de diagnóstico: Speccy.

3. Software de sistema: Windows operating system (OS).

Explanation:

Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.

Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;

1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.

Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.

2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.

Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.

3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.

Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

Answers

Answer:

technology standards

Explanation:

Technology standards can be regarded as standards that dish specifications that set up Product compability as well as communication capability in network, they give standards that are required in using technology in different areas such as teaching, business, IT network as well as learning. One of the body that Ado publish this is the International Society for Technology in Education( ISTE) which is a non profit membership association that regulate technology as regards educational technology.

It should be noted technology standards is Specifications that establish the compatibility of products and the ability to communicate in a network.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?

Answers

Answer:

Webbed storyboard technique

Explanation:

There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.

Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.

An illustration is as follows:

From the homepage of a website, one can access the contact page, the about page, etc.

Each of the listed pages also have link back to the homepage and to every other pages.

A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.

Answers

Answer:

flextimes

Explanation:

Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.

It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.Srv1 stores several shared folders that you use, including the Data share. You use Offline Files in the branch office to make the files on the server are available when the WAN link is down.How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?A. On Srv1, edit the Local Security Policy.B. On Comp1, edit the Offline Files settings in the Sync Center.C. On Srv1, edit the properties for the Datafolder.D. On Srv1, edit the Offline Files settings in the Sync Center.

Answers

Answer:

C. On Srv1, edit the properties for the Data folder

Explanation:

Using the caching feature of Offline Folder gives users access to shared folders through the maintenance of a local copy which allows users to continue working with the resources in the shared folder in the event the server hosting the folder cannot be reached, which leads to increased  productivity. However, when a shared folder is the storage location of sensitive data to which there is restricted access, it may be required to prevent the folder from being cached

The caching option property for the shared folder can be set from within the Offline Settings, to configure the availability of the folder when the server WAN link is down

how do you create a formula in excel​

Answers

Answer:

You can create a simple formula to add, subtract, multiply or divide values in your worksheet. Simple formulas always start with an equal sign (=), followed by constants that are numeric values and calculation operators such as plus (+), minus (-), asterisk(*), or forward slash (/) signs.

Let's take an example of a simple formula.

On the worksheet, click the cell in which you want to enter the formula.

Type the = (equal sign) followed by the constants and operators (up to 8192 characters) that you want to use in the calculation.

For our example, type =1+1.

Notes:

Instead of typing the constants into your formula, you can select the cells that contain the values that you want to use and enter the operators in between selecting cells.

Following the standard order of mathematical operations, multiplication and division is performed before addition and subtraction.

Press Enter (Windows) or Return (Mac).

Let's take another variation of a simple formula. Type =5+2*3 in another cell and press Enter or Return. Excel multiplies the last two numbers and adds the first number to the result.

Use AutoSum

You can use AutoSum to quickly sum a column or row or numbers. Select a cell next to the numbers you want to sum, click AutoSum on the Home tab, press Enter (Windows) or Return (Mac), and that's it!

AutoSum on the Home tab

When you click AutoSum, Excel automatically enters a formula (that uses the SUM function) to sum the numbers.

Note: You can also type ALT+= (Windows) or ALT+ COMMAND += (Mac) into a cell, and Excel automatically inserts the SUM function.

Explanation:

HOPE IT HELPS

What is the correct order or a technological system?

A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output


POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help

Answers

Answer

C

Explanation:

In a system you have to send on input data, then the application processes it and then it returns your output

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

Answers

Group of answer choices.

A. It can communicate with networks inside a particular company with subnets.

B. It can communicate on the local network as well as on the Internet.

C. It has a public IP address that has been translated to a private IP address.

D. It cannot communicate outside its own network.

Answer:

D. It cannot communicate outside its own network.

Explanation:

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.

If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet

Answers

Answer:

The answer is "750".

Explanation:

Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.

Other Questions
A Sink contains exactly 12 liters of water. If water is drained from the sink until it holds exactly Gliter of water less than the quantity drained aitay, how many liters of water were drained away? 10. Explain the principle of electric motor. Write its uses. Please answer the following Anthropology questions fully, thoroughly, and in depth.Part i. What adaptations are associated with an insectivory diet? Give an example of a primate that has this diet. Part ii. What adaptations are associated with a gummivory diet? Give an example of a primate that has this diet.Part iii. What adaptations are associated with a frugivory diet? Give an example of a primate that has this diet.Part iv. What adaptations are associated with a folivory diet? Give an example of a primate that has this diet. Part v. What adaptations are associated with vertical clinging and leaping? Give an example of a primate that practices this form of locomotion. Death of a Salesman teaches us that if we just work hard enough, we will have financial success. Question 7 options: a) True b) False Was the American Revolution a revolution overthrowing a foreign government or a civil war between American colonists? How does this secondperson find happiness? Find the exact value by using a half-angle identity.tan seven pi divided by eight Please HelpThe students in a high school are being randomly split into focus and accountability groups that meet each morning for the first fifteen minutes of the school day. Each group contains four students, selected regardless of gender or grade level.In order to explore the composition of the groups with regard to grade level, you have decided to conduct a simulation using colored discs. Since the number of students in each grade level is about the same, you put the same number of four different colored discs in a bag: red, blue, green, and yellow. You decide that red (r) represents the freshmen, blue (b) represents the sophomores, green (g) represents the juniors, and yellow (y) represents the seniors.Next, you randomly select one disc from the bag, record the color, and put the disc bag in the bag. You do the same thing three more times to represent one group. Then, you complete this entire process twenty-five times, as shown below.Based on the results of the simulation, the chances of a group having at least one senior is:likelyunlikelyneither unlikely or likely need help with this french assignment! Write a paragraph explaining how theme develops in the story.Write a topic sentence that mentions the theme, title, and author.Then follow your graphic organizer and write your ideas about how protagonist, antagonist, conflict, falling action and resolution, mood, and setting develop in the story.Be sure to include the theme of the story.End with a sentence that restates your idea about the theme. The NestRandall squinted up through the trees, trying to gauge the time, but gave up quickly. He should have paid attention when his father taught the family to read the position of the sun. He should have paid attention, too, before sneaking off this morning on his first solo hike, forgetting the whistle his mother stressed he always bring.He pictured his parents now at their camp beneath the tree with the eagles nest, wondering where he was. Randall was wondering the same thing. Lost and out of food, he feared he had but a few hours before darkness closed in, trapping him in the bitter cold with the creatures of the night.He closed his eyes to fight back tears, when he heard it in the distance. Water! His fathers words came flowing into his mind; one tip he actually remembered. If youre ever lost, find a river and follow it.In a flash, he was on his feet, scaling fallen trees, tearing through brush, frantically following the sound. The sky grew darker, but the noise grew louder, and Randall, tired and scared, forged ahead until he found it. He reached the river bank and was mulling his next move when a sudden splash caught his eye.A majestic eagle rose from the water, soaring skyward with a freshly caught fish in its talons. Could it be the same eagle nested above his camp? It glided triumphantly into a high nest a short distance away, eager to greet its family. Randall smiled, equally triumphant, eager to do the same as he followed the eagles flight.In the distance, he saw his mother, his whistle clutched in her hand. someone whos smart English wise help me out here What is the estimated value of 2v12 . 3V5 / V30 . V36 Phn tch vai tr ca cc yu t trong bin tp Audio v Video Fifteen-year-old Roxana wants to skip school today because she is having a bad hair day and is convinced that everybody will notice and think badly of her. Which aspect of adolescent egocentrism is Roxana experiencing?A) the personal fable.B) the imaginary audience.C) the fight-or-flight response.D) the top-dog phenomenon. pls helpwrite a paragraph about this ^ In a class of students, the following data table summarizes how many students have a cat or a dog. What is the probability that a student who has a cat also has a dog?Has a catDoes not have a catHas a dog76Does not have a dog82 Math 120 - 01 Summer 2021Consuelo Butler08/07Homework: PracticeExam 3Question 1, 12.1.13HW Score: 10%, 3 of 30 pointsScore: 1 of 1A professor had students keep track of their social interactions for a week. Thenumber of social interactions over the week is shown in the following groupedfrequency distribution. How many students had at least 60 social interactions forthe week?12Number of SocialInteractions30-3435-3940-4445-4950-5455-5960-6465-6970-7475-79Frequency91411151687311 Presidents can sidestep the usual treaty process through _________________. Group of answer choices exercising executive privilege the necessary and proper clause of the Constitution the privileges and immunities clause of the Constitution the supremacy clause of the Constitution executive agreements which are exempt from Senate ratification Differentiate community health and environmental health.Need answer asap Tres personas, A, B, C, jalan una caja con ayuda de cuerdas cuya masa es despreciable. Si la persona A aplica 3 en direccin horizontal y la persona B aplica a su vez 5 en direccin horizontal, Cul es el valor de la fuerza que debe ejercer la persona C, para que la caja est en equilibrio fsico?