a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without converting the binary number into a decimal representation.) (b) consider the number d in hex. what is the base-4 representation of (d)16?

Answers

Answer 1

The place value can be used to convert a binary number, such as 11010010, into decimal form: 11010010 = 1 x 27 + 1 x 26 + 0 x 25 +1 x 24.In light of the aforementioned, the base-4 number system has 4 digits: 0, 1, 2, and 3. Any 2-bit number can be represented by a single base-4 integer since a 2-bit number can only represent one of the values 0, 1, 2, or 3.

What does base 4 mean?Base-4 is a quaternary  number system. Any real number is represented by the digits 0, 1, 2, and 3.In light of the aforementioned, the base-4 number system has 4 digits: 0, 1, 2, and 3. Any 2-bit number can be represented by a single base-4 integer since a 2-bit number can only represent one of the values 0, 1, 2, or 3.The four digits of Quaternary (Base 4) are 0 through 3.Binary code 4 is 100. In a binary number system, we only use the digits 0 and 1 to represent a number, as opposed to the decimal number system, which uses the digits 0 to 9. (bits).

To learn more about Quarternary number system refer to:

https://brainly.com/question/28424526

#SPJ4


Related Questions

How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to access than the library. They provide only information from reliable sources. They provide immediate access to information on the web. They take longer than using a card catalog but provide only expert sources.

Answers

Answer:

because it is easy to access not hard not all things from the internet are reliable they don't always have expert sources

Explanation:

Search engines like Google, Bing, and Yahoo! have revolutionized research.

The best answer choice for this is that "they provide immediate access to information on the web".

The other choices would be wrong because...

Answer choice A, would be incorrect due to the fact that using the search engines makes it easier to access information than a library as you do not need to walk around the library looking for a book to provide you the answers to your question.

Answer choice B, would be false since the web doesn't always provide only reliable information from creditable sources. In fact, quite a few of the sources on the web that come up, are not helpful or do not assist the user in answering their questions.

Answer choice D, would be wrong since using the search engine to find information is quicker than using a card catalog, and also it does not only provide expert sources since any source of information could pop up when the user searches for it.

What are limitations of AI

Answers

Explanation:

Limitations of artificial intelligence. One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale.

Answer:

Risks and limitations of artificial intelligence in business

Businesses are increasingly looking for ways to put artificial intelligence (AI) technologies to work to improve their productivity, profitability and business results.

However, while there are many business benefits of artificial intelligence, there are also certain barriers and disadvantages to keep in mind.

Limitations of artificial intelligence

One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale. To overcome this, you should have a clear strategy from the outset for sourcing the data that your AI will require.

Another key roadblock to AI adoption is the skills shortage and the availability of technical staff with the experience and training necessary to effectively deploy and operate AI solutions. Research suggests experienced data scientists are in short supply as are other specialised data professionals skilled in machine learning, training good models, etc.

Cost is another key consideration with procuring AI technologies. Businesses that lack in-house skills or are unfamiliar with AI often have to outsource, which is where challenges of cost and maintenance come in. Due to their complex nature, smart technologies can be expensive and you can incur further costs for repair and ongoing maintenance. The computational cost for training data models etc can also be an additional expense.

Software programs need regular upgrading to adapt to the changing business environment and, in case of breakdown, present a risk of losing code or important data. Restoring this is often time-consuming and costly. However, this risk is no greater with AI than with other software development. Provided that the system is designed well and that those procuring AI understand their requirements and options, these risks can be mitigated.

See also Industry 4.0 challenges and risks.

Other AI limitations relate to:

implementation times, which may be lengthy depending on what you are trying to implement

integration challenges and lack of understanding of the state-of-the-art systems

usability and interoperability with other systems and platforms

If you're deciding whether to take on AI-driven technology, you should also consider:

customer privacy

potential lack of transparency

technological complexity

If you're considering writing a tender document to procure AI, you can seek help from the Northern Ireland Artificial Intelligence Collaborative Network(link is external).

AI and ethical concerns

With the rapid development of AI, a number of ethical issues have cropped up. These include:

the potential of automation technology to give rise to job losses

the need to redeploy or retrain employees to keep them in jobs

fair distribution of wealth created by machines

the effect of machine interaction on human behaviour and attention

the need to address algorithmic bias originating from human bias in the data

the security of AI systems (eg autonomous weapons) that can potentially cause damage

the need to mitigate against unintended consequences, as smart machines are thought to learn and develop independently

While you can't ignore these risks, it is worth keeping in mind that advances in AI can - for the most part - create better business and better lives for everyone. If implemented responsibly, artificial intelligence has immense and beneficial potential.

Which test is the best indicator of how well you will do on the ACT

Answers

Answer:

The correct answer to the following question will be "The Aspire test".

Explanation:

Aspire seems to be a highly valued technique or tool that would help parents and teachers take measurements toward another excellent 3rd-10th grade ACT assessment test.

The Aspire test measures academic achievement in five aspects addressed either by ACT quiz such as:

EnglishMathReadingScienceWriting.

So that the above is the right answer.

declare and create a two-dimensional array of ints, plan, with 2 rows, and initialize the first row to 8, 20, 50 and the second row to 12, 30, 75.

Answers

To declare and create a two-dimensional array of integers called plan with 2 rows, you can use the following code:

int[][] plan = new int[2][3];

To initialize the first row of plan to the values 8, 20, 50, you can use the following code:

plan[0][0] = 8;

plan[0][1] = 20;

plan[0][2] = 50;

To initialize the second row of plan to the values 12, 30, 75, you can use the following code:

plan[1][0] = 12;

plan[1][1] = 30;

plan[1][2] = 75;

Code is a set of instructions or statements that are written in a computer programming language. It is used to create software and applications that can be run on computers, smartphones, and other devices. Code typically consists of commands, variables, and other elements that are written using a specific syntax and structure according to the rules of the programming language. It is used by programmers to create and control the behavior of computer programs.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

Combining multiple systems into a larger system is called ____.

Answers

data integration is what i think. not 100% sure tho.

Answer:

data integration

Explanation:

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

What story is told with each match of Chaturanga?


A.

merchants crossing a great desert


B.

families growing old and having children


C.

warring leaders and their armies


D.

children crossing a river

Answers

The story that is told with each match of Chaturanga is warring leaders and their armies. The correct option is C.

What is the match of Chaturanga?

In Chaturanga, the goal is to checkmate the opposing king, however unlike chess, the stalemated king wins.

Making captures in chess is identical to other board games: the moved piece is placed in the square previously occupied by an opponent piece, and this latter piece is removed from the board.

The book is divided into four chapters, each of which is titled after one of the protagonists.

Therefore, the correct option is C. warring leaders and their armies.

To learn more about match of Chaturanga, refer to the link:

https://brainly.com/question/3406191

#SPJ1

Python and using function

Takes two integer parameters. Returns the integer that is closest to 10

Answers

Answer:

def closest_to_10(num1, num2):

   if num1-10 < num2-10:

       return num2

   else:

       return num1

Explanation:

Which of the following server racks would you use for a bolt-free mounting? Nonthreaded racks Threaded racks Round-hole racks Square-hole racks

Answers

The type of server rack that would be used for a bolt-free mounting is the round-hole racks

.What is a server rack?

A server rack is a type of structure that houses computing devices like servers and other related equipment. These racks are designed to organize, secure, and maintain these devices while at the same time providing efficient power, networking, and cooling support for them.

Round-hole racks are server racks with round holes punched in them to mount equipment to the rack. The racks come with toolless fasteners that allow for bolt-free mounting, making it easier and faster to install and uninstall equipment.

Non-threaded racks are server racks that lack threads to allow mounting screws to be screwed directly into the rack. Instead, they feature square holes designed to allow clip nuts to snap into place. They can be used to install equipment in a tool-less fashion.

Learn more about server at

https://brainly.com/question/29306128

#SPJ11

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

What is BASIC programming language?​

Answers

BASIC (Beginner’s All-purpose Symbolic Instruction Code) is a programming language designed by John Kemeny and Thomas Kurtz in 1964 and popularized by Microsoft in the 1970.

BASIC,

in full (Beginner's All-purpose Symbolic Instruction Code,) computer programming language developed by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in the mid 1960s.

FORTRAN

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to do

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to doplease make me brainalist and keep smiling dude I hope you will be satisfied with my answer

Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data?


Options are :

Require complex passwords
Configure the ability to perform a remote wipe
Enable a pattern lock
Enable device lockouts after 3 failed attempts
Enable full device encryption
Disable the installation of application from untrusted sources

Answers

Two settings that would provide the best security and protection for the corporate smartphones' data are:

Requiring complex passwords.

enabling full device encryption.

How can the security of corporate smartphones' data be enhanced?

Settings that would provide the best security and protection for the corporate smartphones' data are requiring complex passwords it ensures that unauthorized users cannot easily guess or access the device. Complex passwords typically include a combination of uppercase and lowercase letters, numbers, and special characters, making them harder to crack.

Enable full device encryption: Full device encryption ensures that all data stored on the corporate smartphones is encrypted and inaccessible without the proper decryption key.

If a device is lost or stolen, the encrypted data remains protected, preventing unauthorized access to sensitive information.

While other settings also contribute to security, these two settings are particularly crucial. Configuring the ability to perform a remote wipe allows authorized personnel to remotely erase the data on the device if it's lost or stolen, preventing unauthorized access.

Disabling the installation of applications from untrusted sources helps mitigate the risk of malicious apps compromising the device's security.

Enabling a pattern lock and device lockouts after failed attempts provide some level of protection, but they may be susceptible to more easily guessed patterns or brute force attacks.

However, the combination of requiring complex passwords and enabling full device encryption ensures a stronger overall security posture for protecting the corporate smartphones' data

Learn more about  smartphones

brainly.com/question/28400304

#SPJ11

he payroll department keeps a list of employee information for each pay period in a text file. the format of each line of the file is write a program that inputs a filename from the user and prints a report to the terminal of the wages paid to the employees for th

Answers

Following are the required code to make a report in tabular format by using the appropriate headers:

Python code:

file_name = input('Enter input filename: ')#defining a variable file_name that inputs file value

try:#defining try block that uses thr open method to open file

 file = open(file_name, 'r')#defining file variable that opens file

except:#defining exception block when file not found

 print('Error opening file ' , file_name)#print message

 exit()#calling exit method to close program

print('{:<12s} {:>10s} {:>10s}'.format('Name', 'Hours', 'Total Pay'))#using print method to print headers

for l in file.readlines():#defining loop that holds file value and calculate the value

 name, hour, wages = l.split()#defining variable that holds the value of file

 hour = int(hour)#holiding hour value

 wages = float(wages)#holiding wages value

 total = hour * wages#defining variable total variable that calculates the total value

print('{:<12s} {:>10d} {:>10.2f}'.format(name, hour, total))#print calculated value with  message

file.close()#close file

Required file (data.txt) with the value:

Database 34 99

base 30 90

case 34 99

What is code explanation?

Defining the variable "file_name" that uses the input method to input the file name with an extension. Using the exception handling to check the file, with using the try block and except block. In the try block check file, and in except block print message with the exit method when file not found. In the next line, a print method has used that prints the header and uses a loop to read the file value. Inside the loop, a header variable is used that splits and holds the file value, calculates the value, prints its value with the message, and closes the file.

To know more about python code,

https://brainly.com/question/21888908

#SPJ4

jaika works at a marketing firm with a lot of graphics-intense users. she is asked to install a printer that is capable of processing large graphics files that are very detailed. she cannot get it to print so she asks you for help. you notice the driver was not installed. what type of driver should you install?

Answers

Jaika works at a marketing firm with a lot of graphics-intense users. PCL (Printer Control Language) type of driver should install.

What is install?

The term install refers to the inbuilt the computer software. There was the installation are the system to the work are the easy and the properly. There was the installation of the hardware and the software.

It relies on the controllers in the printer technology to generate print data, hence the printer quality is determined by the printer's quality. Choose PCL for ordinary publishing and Photoshop for graphic-intensive applications.

As a result, the PCL (Printer Control Language) are the installation.

Learn more about on install, here:

https://brainly.com/question/22609654

#SPJ1

Montel needs to add a calculated field into a report that he has built that will show the total sale price of items sold in a given month. Which type of control should he add in Design view?

control box

text box

label

subreport

Answers

Answer: Label

pls mark brainleist

Answer:

D. Subreport

Explanation:

A subreport is a report inserted into another report.

Let me know if this is correct.

Hope this helps!

how old is the letter 3 on its 23rd birthday when your car turns 53 and your dog needs gas and your feet need lave then when is your birthday when your mom turns 1 and your younger brother is older then you

Answers

Answer:

ummm...idr.k..u got me....wat is it

Explanation:

Art directors win awards for their work, and awards can make their careers. Art directors win awards for work in fields like the following:

film
animation
television
advertising
gaming
For this project, focus on the career of one award-winning art director in one of the above fields and research award(s) that he or she has won through the Art Directors Guild within the past five years. .

As this is a visual arts area, you will need to present examples of the art. Be sure the Terms of Use from your sources allow for student use. You can research your topic and the available range of topics by a variety of means:

internet searches
movie databases
the award organization archives
industry news and magazines
Use reliable sources and factual content while keeping quotes to a minimum. Present the topic in your own words, and do not present copied text from published sources as your own reporting.

In your paper, include a timeline, a discussion of your chosen art director’s education, and career highlights. You will need to show why the art director won the award.

Your presentation should be 3-4 pages if written, or five minutes long if presented as a Power Point presentation. Use your own words, and use quotes sparingly. If your presentation is oral, practice presenting your project and adjust your length for a clear, calm, and concise delivery. Check your work.

Please include the following:

A title
Introduction to your topic
Why you chose it
Background info, and bio of the subject of your presentation
Explanations of terms as needed
What you found out about your subject
Examples, timeline, photos, artwork
What you particularly like about your subject
Conclusion, with personal ideas if you imagine a similar career for yourself
Citations of sources
Question # 1
File Upload
Submit your biography of an art director.

Answers

Answer:

N/A

Explanation:

im sorry mate, but this sounds like its supposed to be a paper by you, i cant write a paper for you, but i can help you make one, ive got some methods and tricks i can share to make it easier

again not trying to be mean, just trying to help the best way i can :)

Answer:

slide 1

A title

And the Art Direction Award Goes to...ME

slide 2

Intro to Tamara Deverell

Tamara Deverell is an actress who has appeared in Nightmare Alley (2021), Guillermo del Toro's Cabinet of Curiosities (2022), and Star Trek: Discovery (2017). Since February 7, 1992, she has been married to Ken Woroner. They've got two kids.

slide 3

Career

Tamara Deverell is a production designer who has worked on Star Trek: first two seasons as well as the live action episodes of Star Trek: Short Treks. She received the 2019 Directors Guild of Canada Award for Best Production Design - Dramatic Series for her work on the episode "Such Sweet Sorrow, Part 2" of Star Trek: Discovery.

Deverell was interviewed for the DIS Season 1 DVD and Blu-ray special feature "Designing Discovery," as well as the Star Trek: Discovery Official Companion feature "Making Discovery.

In the late 1980s, Deverell attended Capilano University in Vancouver, completed a four-year degree at the Emily Carr Institute of Art and Design, and began working in film art departments in Montreal.

slide 4

Citations of source

Image from wiki

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

Please help me. It's due in 2 hours.

Please help me. It's due in 2 hours.

Answers

1d 2b 3c 4a 5e 6f 7g

which agencies have access to tlets

Answers

The agencies that have access to TLETS (Texas Law Enforcement Telecommunications System) are local, state, and federal law enforcement agencies.

These agencies use TLETS to access and exchange criminal justice information such as arrest warrants, criminal history, and stolen property reports. Other agencies that have access to TLETS include the Texas Department of Public Safety, Texas Department of Criminal Justice, and the Federal Bureau of Investigation.

These agencies can use TLETS to communicate with other agencies, conduct criminal investigations, and perform other law enforcement activities.

You can read more about law enforcement at https://brainly.com/question/21082629

#SPJ11

800,000= 180,000(P/AD, i,5) + 75,000(P/F,i,5) I want to find interest rate (i)
Would you let me know how to calculate this using Excel?

Answers

here is how to compute the above using Excel.

How to calculate the above

Open a new Excel spreadsheet and enter the following values in the cells:

Cell A1: 800,000 (Total amount)

Cell A2: 180,000 (Payment at the end of each period)

Cell A3: 75,000 (Payment at the beginning of each period)

Cell A4: 5 (Number of periods)

In cell A5, enter an initial guess for the interest rate (i). For example, you can start with 0.1 (10%).

In cell B1, enter the formula =A2*PMT(A5,A4,0) to calculate the present value of the periodic payments at the end of each period.

In cell B2, enter the formula =A3*PMT(A5,A4-1,0) to calculate the present value of the periodic payments at the beginning of each period.

In cell B3, enter the formula =A1 - B1 - B2 to calculate the remaining balance.

In cell B4, enter the formula =RATE(A4, B2, B1) to calculate the interest rate.

Learn more about Excel Formula at:

https://brainly.com/question/29280920

#SPJ1

true or false a weighted inventory system is often tied into player advancement

Answers

Answer:tayfana

Explanation:true

ASAP please
What is an algorithm?
1. a way to make an informed judgment
2. used only on a computer
3. used only with map directions
4. a set of directions for problem solving

Answers

I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Answer:

Answer is D :)

Explanation:

What can be used to teach Karel to turn right?

functions, veriables, dog treats, Karel can already turn right.

Answers

Karel can already turn right, so no additional tools or techniques are needed to teach Karel how to turn right.

Karel is a programming language used for teaching computer science concepts. It is designed to be easy to learn and use, so students can focus on the fundamental concepts of programming.

One of the basic commands in Karel is turn_right(), which instructs Karel to turn 90 degrees to the right. As Karel can already perform this command, no additional tools or techniques are required to teach Karel how to turn right.

However, if Karel were unable to turn right, additional tools such as functions and variables could be used to help teach this concept. Dog treats are not relevant to teaching programming concepts.

For more questions like Command click the link below:

https://brainly.com/question/30319932

#SPJ11

1) Write a program that prints the sum of the first ten positive integers, 1+2+...+10
I don’t know how to write the code for python

Answers

total = 0

for i in range(1, 11):

   total += i

print(total)

1) Write a program that prints the sum of the first ten positive integers, 1+2+...+10I dont know how

Which of the following represents the correct order in which you should install components into the case after disassembling a computer?a. power supply, drives, motherboard, cards
b. drives, motherboard, cards, power supply
c. cards, motherboard, power supply, drives
d. motherboard, drives, cards, power supply

Answers

The correct order to install components into the case after disassembling a computer is: "power supply, drives, motherboard, cards". Thus, Option A is correct.

This is because this order allows for proper cable management and avoids interference with other components during installation.

Starting with the power supply ensures proper cable management and allows for easy access to connect the power cables to the motherboard and other components, followed by the installation of drives to avoid any possible damage to the motherboard during installation.

The motherboard should be installed next, followed by any expansion cards, which should be installed last to avoid interference with other components. This order ensures that all components are properly installed and connected, reducing the risk of damage and ensuring proper functionality of the computer.

Learn more about disassembling a computer https://brainly.com/question/30561810

#SPJ11

4. Compute the following additions
a. 1001 + 10=
b. 100111 + 111=
c. 101101 + 1110=
d. 111001 + 11=
e. 1111 + 1=

Answers

A. 1011
B. 100222
C. 102211
D. 111012
E. 1112

A time line may identify cause or effect of an event?
True or False?

Answers

true whenever you look at one it helps identify the cause/effect of an event

Why have companies gotten more creative with ways to reach us?​

A. because we do not our privacy and security settings

B. because we respond well to their traditional methods

C. because we tend to read everything on web pages

D. because we ignore or delete ads messages

Answers

Answer:

D.) We often ignore messages sent by companies or ads

Explanation:

Companies are trying to be more creative with their approach towards people, as if we read their messages, we may consider buying or checking out their product.

Answer:

c

Explanation:

What type(s) of media can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times)? (2 points) Enter your answer​

Answers

Answer:

An optical disc.

Explanation:

An optical disc is a small and flat digital-optical disc that is usually circular and used to store computer data by using a laser beam.

The optical disc is able to store digital data because it is made up of a polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.

Additionally, the data stored in an optical disc cannot be scrambled by a magnet because it isn't made of a magnet or doesn't have a magnetic field. There are different types of optical disc and these are; CD-ROM, CD-R, CD-RW, DVD-RAM, DVD-ROM, DVD+/-RW, BD-RE, DVD+/-R, BD-R, BD-ROM.

Where; CD is an acronym for compact disc.

DVD is an acronym for digital video disc.

BD is an acronym for Blu-ray disc.

R represents read only.

RW represents read and write.

RE represents read, write and erasable.

Hence, an optical disc is a type of media that can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times).

Other Questions
Which of the following explains how Hahn, Strassman, and Meitner tried to influence the use of their discovery? They opposed the use of energy released during nuclear fission for military purposes. They supported the use of quantum mechanics for identifying chemical substances. They supported the use of radioactive elements for diagnostic purposes. They opposed the use of nuclear fusion during the Manhattan Project. 1. How much support is needed to pass a bill in the Legislature?a. More than 50% in the Senate; less than 50% in the House b. At least 70% in one housec. More than 50% in both houses compare and contrast the difference between regulated gene expression and constitutive gene expression. Select the correct answer. What is the value of y in this linear system? 41 - 2y + 3z = 1 80 - 3y + 5z = 4 71 - 2y + 4z = 5 O A. 3 OB. 0 O C. 1 o D. -1 Reset Next Al rights reserved. Select whether the advantage or strategy listed below was a Northern one or a Southern one Blockading ports Having a bigger population Controlling the Mississippi Having stronger military leaders Dana works as a financial consultant at a start-up company called MoneyCare. While some of her friends earn more than she does working for similar positions in other companies, Dana finds her work far more interesting and challenging than what her friends do. As MoneyCare is a small organization, Dana has a lot of responsibilities and believes that she is actually learning far more on the job than she thought she would. Which of the following statements is true about Dana? A. She thinks total rewards from her job are low. B. She finds the intrinsic rewards from this job very satisfying. C. She thinks the extrinsic rewards from this job are very high. D. The extrinsic rewards account for the bulk of the total rewards she gets from this job. cansomone please help me with this :( i keep trying to figure it outand i dont know how else to approach this question. thanks so much!Magnesium metal is reacted with hydrochloric acid to produce hydrogen gas. A sample of hydrogen gas is collected over water in a eudiometer. Calculate the mass (in grams) of magnesium metal needed to Write an import statement that imports just the functions sqrt and log from the math module. 3x ^3- 12x^2- 15x = 0factor and solve to find all the zerosshow all work What type of connection does a country's water usage have with a country's wealth? A) Generally, if a country is considered wealthy it will also use a lot of water B) Generally, If a country is wealthy it will not use much water C) There is no connection between a country's wealth and water usage Please help! 20 pts and brainliest!! An isosceles triangle has an angle that measures 124. Which other angles could be in that isosceles triangle? Choose all that apply. 124, 28, 65, 41 Miguel Is building a doghouse.He cuts one sheet of wood to make the front wall.he also cuts out a door that is 2 feet by 2 feet.The dimensions, in feet,are shown in the diagram,Miguel needs to paint the wood.What amid the area he needs to paint?1.What is the area of the rectangular piece of wood before the square is cut out? Include units with your answer2. what is the area of the square that was cut out of the wood? Remember to include units 3. What is the area Miguel needs to paint? Explain how you found your answer. The formula for the volume of a pyramid Is V = 1/3 Bh, where V is the volume, B is the area of the base, and h is the height of the pyramid. Ceciliahas a pyramid-shaped candle with a square base. The volume of the candle is 720 cm3 and the area of the base is 36 cm2 A rectangular closet has a perimeter of 16 feet and an area of 15 square feet. What are thedimensions of the closet? Scores for Shots fired by Olympic MarksmenAt the Olympic level of competition, even the smallest factorscan make the difference between winning and losing. For example,Pelton (1983) has shown that Over+the+past+year+the+inflation+has+been+10%.+the+price+of+a+used+ford+suv+has+fallen+from+$6,000+to+$5,000,+or+16.6%.+by+what+percentage+has+the+real+price+fallen?+chegg What details the steps the system must perform along with the expected result of each step in the implementation phase when the organization places the system into production so users can begin to perform actual business operations with it Which word is the best example of a specific verb?a. sayb. talkc. whisperd. speak The length of a rectangle is the sum of the width and 2. The area of the rectangle is 63 square units. What is the width, in units, of the rectangle? Which phrase describes chemical potential energy? (1 point)the amount of energy needed to break a bondo the amount of energy absorbed by reactantsthe amount of energy stored in bondsthe amount of energy absorbed by products