Question No. 5:
Convert the following by showing all the steps necessary
a) (1001111) 2 = ( ) 10
b) (11000001) 2 = ( ) 16
c) (E16) 16 = ( ) 10
d) (56) 10 = ( ) 16
e) (63) 10 = ( ) 2

Answers

Answer 1

Answer:

The answers are:

[tex]a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2[/tex]

Explanation:

a. (1001111) 2 = ( ) 10

In order to convert a base 2 number to base 10 number system the place values are used.

the procedure is as follows:

[tex](1001111)_2\\=(1*2^6)+(0*2^5)+(0*2^4)+(1*2^3)+(1*2^2)+(1*2^1)+(1*2^0)\\=(1*64)+(0*32)+(0*16)+(1*8)+(1*4)+(1*2)+(1*1)\\=64+0+0+8+4+2+1\\=79[/tex]

b) (11000001) 2 = ( ) 16

In order to convert a base 2 number into base 16, group of 4-bits are made starting from right to left

The groups from the given number are:

1100 0001

Then the groups are changed in to decimal/hexa

So,

[tex](1100)_2 = (1*2^3)+(1*2^2)+(0*2^1)+(0*2^0)\\=(1*8)+(1*4)+(0*2)+(0*1)\\=8+4+0+0=12=C\\\\0001=1[/tex]

Writing in the same order in which groups were:

[tex](C1)_{16}[/tex]

c) (E16) 16 = ( ) 10

[tex](E16)_{16}\\=(E*16^2)+(1*16^1)+(6*16^0)\\=(E*256)+(1*16)+(6*1)\\=3584+16+6\\=3606[/tex]

d) (56) 10 = ( ) 16

Dividing by 16 and noting remainders

16        56

           3 - 8

So,

The number in base 16 is 38

e) (63) 10 = ( ) 2

Dividing by 2

2         63

2         31 - 1

2         15 - 1

2          7 -  1

2          3 -  1

            1 - 1

So the  number after converting in base 2 is:

111111

Hence,

The answers are:

[tex]a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2[/tex]


Related Questions

QUESTION 3 / 10
Which of the following is the BEST reason to use cash for making purchases?
A. Keeping track of how much you have spent is simple.
B. Splitting bills with friends is easier.
C. Getting more cash from an ATM machine is easy to do.
D. Knowing what you have spent your money on is
simple.

Answers

A.keeping track of how much you have spent is simple

Ms office suite comes with its own set of pictures in the​

Answers

Answer:

clipart ...........................

Explanation:

clipart is the correct answer for the above question.

Most operating systems perform these tasks. coordinating the interaction between hardware and software allocating RAM to open programs creating and maintaining the FAT modifying word processing documents correcting spreadsheet formulas displaying the GUI

Answers

Answer:

The answer are A.) Coordinating the interaction between hardware and software And B.) Allocating RAM to open programs

Explanation:

Hope this helps :)

Tasks that are been performed by most operating systems are;

Coordinating the interaction between hardware and software.Allocating RAM to open programs.

An operating system can be regarded as system software which helps in running of computer hardware as well as software resources and mange them.

This system provides common services for computer programs.

It should be noted that  operating system coordinating the interaction between hardware as well software.

Therefore, operating system, allocate RAM to open programs.

Learn more about operating system at:

https://brainly.com/question/14408927

20 POINTS Which of the following statements is true of subroutines? Check all that apply.

They can be used in multiple places.

They can be used in one place only.

They save a programmer time since they are reusable.

They can be used only once.

They can contribute to excessive use of a computer’s resources.

Answers

Answer:

1,3,5?

Explanation:

What symbol following a menu command lets you know that a dialog box will be displayed? an ellipse an arrow a check mark a radio button

Answers

cords   and  batteries or electric radio

Answer:

It would be an ellipse

how does computer number system play a Vital role in a computer calculation. ​

Answers

Answer:

When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand the positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number

Explanation: SAME AS

Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space. Your program's output should only include the two words and a space between them.

Hint: To print both words on one line, remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a space between the words as well.

Sample Run

Enter a word: Good
Enter a word: morning
Good morning

Answers

word1 = input("Enter a word: ")

word2 = input("Enter a word: ")

print(word1 + " " + word2)

I hope this helps!

Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control is ________

Answers

Answer:

Management Information System(MIS)

Explanation:

management information system can be regarded as an information system

that is engaged in decision-making as well as the coordination and control and analysis of information in an organization. It involves processes as well as people and technology when studying the management information systems in organizational view.

In Management Information System(MIS) data can be gotten from the database, as well as the compilation of reports, this report could be inventory-level reports,

financial statements/analysis so that routine decision can be made by the manager. It should be noted that Management Information System(MIS) is the Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control.

Individuals who break into computer systems with the intention of doing damage are called​ _____________.

a. white hats
b. ​e-criminals
c. hackers
d. keyloggers
e. black hats

Answers

I think the answer is hackers

The individuals who made the unethical entry into a person's system with intentions of damage are termed, hackers. Thus, option C is correct.

What is a computer system?

A computer system has been given as the network connection of the hardware and the software equipped with the objects that are used for the operation of the computer.

The computer system with the internet connection has been able to make the connection to the world. as well the invention mediates the work with ease as well.

The system thereby has the access to the passwords and the personal details of an individual as well. There are individuals who try to make access the computer system in an unethical way and intended to damage the system.

The computer viruses are used for the following purpose and were drawn by the hackers. Thus, option C is correct.

Learn more about the computer system, here:

https://brainly.com/question/14253652

#SPJ2

Complete the sentence.
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called______

Answers

Answer:

Compilation

Explanation:

" Python is an interpreted, high-level, general-purpose programming language. It is is dynamically typed and garbage-collected. "

But first it does a compilation for a file with the extension `.pyc`, so the answer is compilation, even though python is being interpreted

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

What is code?

The line of code returns the ASCII code.

ASCII, has the full form American Standard Code for Information Interchange. It consists of a 7-bit code in which every single bit represents a unique alphabet.

Python is a high-level computer programming language. It is dynamically used.

First, it does a compilation for a file with the extension `.pyc`

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

Learn more about code.

https://brainly.com/question/2596551

#SPJ2

In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.

Answers

Answer:

Application Server

Explanation:

The Application Server is a component in computer engineering that presents the application logic layer in a three-tier architecture.

This functionality allows client components to connect with data resources and legacy applications.

In this process of interaction, the Application Server runs the program code from Tier 1 - Presentation, through Tier 2 - Business Logic to Tier 3 - Resources, by forcing through the business processes.

Which of the following statements about computational thinking are true? Select 3 options.

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

In this question the choices are missing, the choices of this question are:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions, Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development. Computational thinking is basically synonymous with programming. Computational thinking is a set of techniques used to help solve complex problems or understand complex systems Understanding all of the minor details about a problem is critical in computational thinking

The correct 3 choices about computational thinking that are true are given below:

1.The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

2. Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

4. Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

Answer:

-The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

-Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

- Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

Explanation:

I just took the test got a 100%

Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.

Answers

Answer:

MULTITASKING OS

Explanation:

MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.

Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously

Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.

(plsssssssssssssssssssssssssssssssssssssss helpp meee)
think about system you know,list the parts of the system,describe some ways that the parts are connected to the whole​

Answers

Answer:

A computer is a complex machine. While most of it works on a microscopic level, it certainly has recognizable macroscopic components that contribute to its uses. A computer can be used to do just about anything from simple calculations to preparing reports to sending rockets into space to simulating the spread of cancer in body organs. Some of the parts are, the motherboard, the power supply, the central processing unit, the optical drive ect. The motherboard plays roles like storing some simple information when the computer is off, such as the system time. The power supply, as you might have already guessed is the powerhouse of the computer. The CPU mainly does arithmetic and logical tasks. It will make a bunch of calculations to ensure the functions of the computer are carried out efficiently. An optical drive is used to read CDs and DVDs, which can be used to listen to music or watch movies. They can also be used to install software, play games, or write new information into a disk.

Explanation: O///O sorry if this is bad....

which devices are used in networking

Answers

Answer:

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.

Access Point.

Explanation:

For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned

Answers

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two tuples (separately) as arguments: (1, 2, 3, 4) & (4,6,8): prod_all(1, 2, 3, 4) # The answer should be 24 prod_all(4, 6, 8) # The answer should be 192 [10]: def prod_all(*args): tupl = (args) total *= n # total = total *n

Answers

Answer:

from functools import reduce

def prod_all(*args):

   prod = reduce(lambda x,y: x *y, args)

   return prod

result = prod_all(4,6,8)

print(result)

Explanation:

The use of the "*args" passes a tuple of variable length to a python defined function. The function above takes any number of arguments and returns the product using the python reduce module and the lambda function.

What is the part of a CSS declaration that describes the HTML tag?
A.the selector
B.the pointer
C.the value
D.the property

Answers

Answer:

a selector

Explanation:

Answer:

A. the selector

who wants 100 points? comment buh. i don't rlly care buh.

Answers

Answer:

I do

Explanation:

Answer:

hey bae I do heheheheeheh

3. Answer the following questions.
a. How does computer number system play
calculations?
a vital role in a
computer​

Answers

Answer:

Computers use the binary number system to store data and perform calculations.

Explanation:

Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary consideration in the comparison

Answers

Answer:

The C's malloc and free functions and the C++'s new and delete operators execute similar operations but in different ways and return results.

Explanation:

- The new and delete operators return a fully typed pointer while the malloc and free functions return a void pointer.

-The new and delete operators do not return a null value on failure but the malloc/free functions do.

- The new/delete operator memory is allocated from free store while the malloc/free functions allocate from heap.

- The new/delete operators can add a new memory allocator to help with low memory but the malloc/free functions can't.

- The compiler calculates the size of the new/delete operator array while the malloc/free functions manually calculate array size as specified.

Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Address

Answers

Answer:

Compress

00eb:0000:0000:0000:d8c1:0946:0272:879

IPV6 Addres

Explanation:

What are the different types of store-based and nonstore-based retail locations? Provide a real example (store name) for each different type.

Answers

Explanation:

For Store-based retail locations; they've been grouped on the basis of:

ownership, andthe type of merchandise offered  

I. On the basis of ownership, we have:

Independent retailer locationchain retail locationfranchise location

II. On the basis of merchandise offered, we have:

departmental store locationconvenience store locations supermarket locations

For Non-Store retail locations, ie. retailing that does not a physical store. These include;

direct sellingmail orderonline retailing outlets

laptop components that can be replaced relatively easily include the ____ and the ____

first part
screen
power supply
RAM

second part
hard disk
keyboard
touchpad​

Answers

Answer:

Power supply and Hard disk

Explanation:

Need help with 4.7 lesson practice edhesive

Answers

Answer:

Question 4 => 4th answer: The first line should be for x in range (7, 10):

Question 5 => 2nd answer: 14 16 18 20 22 24 26 28 30 32

Explanation:

Question 4

"for" loops always need a variable (like "x") defined to iterate with different values.  for x in range (7, 10): makes x to take values 7, 8, 9 and 10 successively  and execute print(x) each time.

Question 5

The expression x in range (7, 16) makes x to take values from 7 up to 16 inclusive. So for each iteration it will execute print x*2 which prints the double of the actual value for x. Starting with x=7, it will print 14, then with x=8 will print 16, and so on. All values are shown on the table below:

X       Prints

7        14

8        16

9        18

10       20

11       22

12       24

13       26

14       28

15       30

16       32

The code segments are illustrations of loops.

4: The first line should be for x in range(7,10):5: The output is 14 16 18 20 22 24 26 28 30

The syntax of a for loop is:

for variable in range (begin,end+1):

The loop in question (4) is given as:

for range (7,10)

This means that, the variable is missing.

So, the first line of the code segment should be

for x in range(7,10):

For question 5, the value of x would range from 7 to 15.

The print statement prints twice x, followed by a space.

So, the output would be 14 16 18 20 22 24 26 28 30

Read more about loops at:

https://brainly.com/question/19323897

fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating

Answers

Answer:

that's a good fact about yourself the more love that better

what are the types of slide show in powerpoint? define.​

Answers

Answer:

normal view

slide sorter view

master view

notes page view

An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, acb), 'bac', 'cba, 'cab' are all anagrams of the string 'abc'. Given two arrays of strings, for every string in one list, determine how many anagrams of it are in the other list. Write a function that receives dictionary and query, two string arrays. It should return an array of integers where each element i contains the number of anagrams of queryll that exist in dictionary.

Answers

Answer:

from collections import Counter

def anagram(dictionary, query):

   newList =[]

   for element in dictionary:          

       for item in query:

           word = 0

           count = 0

           for i in [x for x in item]:

               if i in element:

                   count += 1

                   if count == len(item):

                       newList.append(item)

   ans = list()

   for point in Counter(newList).items():

       ans.append(point)

   print(ans)        

mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']

setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']

anagram(mylist, setter)

Explanation:

The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.


What is a file type and why is it important? Give at least three examples of file
types, including the associated file extension and
program.

Answers

What's in the setting file ?

2.4 Code Practice: Question 2
Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is inputted by the user.

Sample Run
Enter a number: 15.789
Sample Output
0.789
Hints:
You'll likely need to use both the int() and float() commands in your program.
Make sure that any number the user inputs is first stored as a float.
You'll need to use at least two variables in your program: one that stores the original value entered by the user, and one that represents the integer value entered by the user.
These two variables can be subtracted from one another, to leave just the decimal portion remaining.
Don't forget to have your program print the decimal portion at the end!

Answers

num = float(input("Enter a number: "))

num1 = int(num)

print(num - num1)

I hope this helps!

Following are the C++ program to calculate the decimal part:

Program Explanation:

Defining the header file. Defining the main method. Inside the method, a float variable "num" is declared that inputs the value. In the next step, an integer variable "x" is declared that converts float value into an integer that holds the whole part number.In the next step, "num" is declared that removes the whole number part from the decimal value, and prints its value.

Program:

#include <iostream>//header file

using namespace std;

int main()//main method  

{

float num;//defining a string variable

cout<<"Enter password: ";//print message

cin>>num;//input float value

int x=int(num);//defining integer variable that converts float value into integer that hold whole part number

num=num-x;//remove whole number part from the decimal value  

cout<<num;//print decimal number

  return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/17554487

Other Questions
Once blood tonicity is negatively impacted, can the consequences be reversed? what is the answer to (3^4)^4 what the slope of(7,3) (6,-2) what role did german leaders play in the austria-hungary decision to declare war on serbia When Carla looked out at the school parking lot, she noticed that for every 2 vans, there were 5 trucks. If therewere 84 total vehicles in the parking lot, how many of them were trucks? 4. Give an example of a potential kitchen contaminant and explain how the seven principles of the HACCP (Hazard Analysis Critical Control Point) procedure would help to eliminate this contaminant from your kitchen. Give the equivalent measurement of the materials given below.equivalent sample materials (unit)1. 1 cup nuts meaurement2. 4 table spoon sugar2. 5 whole eggs4. 1 gallon ice cream5. 2 bars butter6, 3 lbs. dried nuts7. 5 big cans of evaporated milk8. 1 teaspoon sugar9. 16 tablespoon salt10. 5 cups flour Hemoglobin A1 is the quaternary protein structure on a red blood cell involved in oxygen transport. Hemoglobin A1 has two -chains and two -chains. A blood pH change caused several bonds to break between the amino acid chain. Which would most likely result from this change in concentration? A.The hemoglobin will no longer carry oxygen due to a change in the shape of the protein.B.The hemoglobin will continue to carry oxygen at the same level as the previous structure. C.The hemoglobin will adapt to concentration changes to maintain its original shape.D.The hemoglobin will increase its oxygen carrying capacity to restore the blood concentration levels. 2. Which of the following is not true about the Amerikadeutscher Volksbund or German American Bund?a. Was an organization of "patriotic Americans of German ancestry"b. Caused controversy and public unrest in their New York City rally at Madison Square Garden in 1939c. Though they were a vocal group, they never had more than a few hundred followers/membersd. Believed that George Washington was America's first fascist leadere. Actually operated "Hitler Youth" camps around the countryf. None of these are untrue Food intolerance generally results inA. a rash or hives.B. a trip to the hospital.C. mild to serious discomfort.D. swelling of the face and hands.Will give brainliest what would be the complementary strand of aatgac What is the name of the theory that explains how forces deep within Earth can cause ocean floors to spread and continents to moveA. continental driftB. tectonic kinetics C. plate tectonicsD. wave motion write an equation that represents the line. (-3,-6) and (2,-2) use exact numbers Why do lenders often require a down payment when credit is used to purchase a good? Liam wants to determine if foam is a good insulator. He decides to connect wires to two ends of a battery and then connect one wire to each end of a foam cup. Which inquiry skill is Liam using? 50 PTSin JavaWrite a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isnt in one of those Strings, then its an illegitimate password! After basketball practice, Tyler began feeling a sharp pain in his knee. He visited the doctor and found out that he had torn one of the many ligaments in his knee. Which of the following best describes the function of the ligament he injured?Immersive Reader(1 Point)A. Connecting cartilage to musclesB. Cushioning the ends of bonesC. Connecting bones to other bonesD. Connecting muscles to bone USED TO write 5 sentences using to There are 11 books on a shelf , 7 of these books are new . The rest of them are used .What is the ratio of new books to used book ? Match each sentence to its purpose in a well-developed analysis.This shows the Haida myth largelydepends on the work of a child.a concluding statementRaven as a child is an importantcharacter because he creates light.the analysis of the evidenceTherefore, both myths show that theircultures may have valued children.a connection back to the pointThe Haida myth uses Raven, who takesthe shape of a baby.the evidence