08. Consider the following four binary numbers.
11100111
10101010
11110000
11001100
Which of the following displays the numbers in ascending order?
(A) 10101010, 11001100, 11100111, 11110000
(B) 11110000, 11100111, 11001100, 10101010
(C) 11100111, 10101010, 11110000, 11001100
(D) 10101010, 11001100, 11110000, 11100111

Answers

Answer 1
Answer: A
Explanation: If you convert the binary into decimal
you can easily determine the order from least to
greatest. In this instance of "a," we have 170, 204,
231, 240.

Related Questions

Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face ​

Answers

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode

Answers

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.

How is packet sniffing done?

Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.

Packet sniffing tools such as WireShark and SmartSniff are examples.

Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.

For further details about Packet Sniffing click here:

https://brainly.com/question/14417640

#SPJ4

What element allows text to be displayed in italics, which means the words are slanted to the right?

a
The < crooked > element

b
The < italic > element

c
The < em > element

d
The < slant > element

Answers

Answer:

the answer is the italic element

starting a computer after it has been turned off is term as​

Answers

Answer:

Booting

Explanation:

Which of the following "friction" material settings is most likely to be used for an icy surface?
a
0
b
1
c
100
d
-1

Answers

The type of friction that is most likely to be used for an icy surface is a static friction.

What is friction?

It should be noted that friction simply means a force that exist between two surfaces that are sliding across each other.

In this case, the type of friction that is most likely to be used for an icy surface is a static friction. Here, a little friction is offered.

Learn more about friction on:

https://brainly.com/question/1424758

This is an example of what type of formula?
=(D1+D17)

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different ypes of formula functions in excel such as;

SUMCOUNTCOUNTAIFTRIMMAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Read more about Excel Functions at; https://brainly.com/question/14042837

Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and quantity sold how should she maintain the data

Answers

Answer:

store quantity in stock and quantity sold in a single cell

Explanation:

A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean

Answers

A structure which can execute a set of statements only under certain circumstances is: C. decision.

What is a decision structure?

A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.

This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.

Read more on decision structure here: https://brainly.com/question/13297323

If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?

Answers

Answer:

I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps

Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.

what should chris do to ensure that he can see others’ comments?

a. select show all comments on the review tab.
b. select show no comments on the review tab.
c. select add comment on the review tab.
d select track changes on the review tab.

Answers

Answer:

a. select show all comments on the review tab

Explanation:

Please mark me brainliest if correct

Answer:

A

Explanation:

Does single quote and double quote work same in javascript

Answers

Answer:

yes!

Explanation:

the only difference is that some companies prefer one over the other as a standard

https://stackoverflow.com/questions/242813/when-should-i-use-double-or-single-quotes-in-javascript

but they work the same

Fill in the blanks to explain another memory Grandpa shares with
Amara

Answers

The answers to the fill in of blanks to explain another memory Grandpa shares with Amara are

Young RecentlyOnly moments ago

What is  blank statement?

A blank statement is known to be a kind of empty statement where some information are said to be missing.

In the text above, . "Even though her Grandfather had passed away when Gina was little young" and Recently, her memories of him are still as fresh as the bakers bread."

Learn more about blanks  from

https://brainly.com/question/25573309

I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)

Answers

Answer:

I mean if your talking about games then just try Cool math I will give link in comments

Explanation:

Answer:

I have 4.

Explanation:

DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.

DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.

INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.

INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.

Have a great day!
#EquestrianLion

if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?​

Answers

Answer:

I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.

Explanation:

I think that's what should happen but I'm not sure though.

how does computer science help in dance

Answers

Do not troll, I will be writing you up.

You have received an update package for a critical application you are running on a virtual machine. You have been told to install the update package and that you cannot very little downtime. What should you do first?

Answers

The first thing to do install the package without having downtime is; Virtualization.

What is virtualization?

Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.

Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.

Since there should be no down time, then it is advisable to first carry out virtualization.

Read more about virtualization at; https://brainly.com/question/26462832

Which of the following best describes your sequence of actions when developing a web page?

Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file

Answers

Answer:

I think D

Explanation:

Answer:

B

Explanation:

Saving it, then editing it wouldn't load the new changes

but editing it than saving it, would load the new Changes

Katie wants to use VLOOKUP for a column in a table. Which value of the mode perimeter should she use to look for an exact match of the searched data?

Answers

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

3) Write the example of LAN.​

Answers

Networking at home, Networking in an office, networking between two computers.

Networking in home, office. Networking in school, laboratory, university campus. Networking between two computers. Wi-Fi (When we consider wireless LAN).

What is a critical consideration on using cloud-based file sharing and storage applications.

Answers

Answer:

Determine if the software or service is authorized

Explanation:

:)

Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive average the geometric average the common average

Answers

Answer:

"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."

Explanation:

5. 16 LAB: Brute force equation solver

Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.


How do I write this in python?

Answers

Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .

How to find the solution of an equation in python?

To make it simpler the code is described as:

def brute_force_two_equations(first_values, second_values,

                             max_range=10, min_range=-10):  

for x in range(-10, 10, 1):

   for y in range(-10, 10, 1):

      if a * x + b * y == c and d * x + e * y == f:

          print(x, y)

else:

   print('No solution')

def equation(const1, const2, x, y):

   return const1 * x + const2 * y

def get_three_integers():

   inputs = []

   for i in range(0, 3):

       inputs.append(int(input("Please enter a value: ")))

   return inputs

if __name__ == "__main__":

   print("== First Equation ==")

   first_equation_values = get_three_integers()

   print("== Second Equation ==")

   second_equation_values = get_three_integers()

   solution = brute_force_two_equations(first_equation_values,

                                        second_equation_values)

   if solution:

       print(f"(x, y) {solution}")

   else:

       print("No Solution found")

See more about python atbrainly.com/question/22841107

If a company saw an online photo of you playing basketball, it might try to sell
you:
A. music CDs.
B. pet food.
C. high-top sneakers.
O D. a baseball mitt.
ВМІТ

Answers

Answer:

C. high-top sneakers

PLS HELP MEE it's due in 2 minutes​

Answers

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

How to creatte a react app without a git hub repository

Answers

Answer:

You needn't be on Github. You just need to have the software, like visual code installed on your computer.

If you've got all these things sorted, then you'll be able to make apps without github.

45 POINTS
PLS HURRY

An issue with the automated collection of personal information is _____. Select 2 options.

it does not yet collect data efficiently
it does not yet collect data efficiently

it processes highly sensitive data
it processes highly sensitive data

that people do not trust it enough
that people do not trust it enough

it may lead to inaccurate decisions
it may lead to inaccurate decisions

it uses robust security solutions
it uses robust security solutions

Answers

Answer:

2 - It processes highly sensetive data

4- it may lead to inaccurate decisions

Explanation:

It processes highly sensitive data and it may lead to inaccurate decisions.

What is automated collection?

The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.

There are two options:

It handles highly sensitive information.It may result in poor decisions.

Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.

Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.

Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.

For more details regarding automated collection, visit:

https://brainly.com/question/14680064

#SPJ3

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

data in ai uses what >

Answers

Answer:

Explanation:

artificial intelligence describes the ability of computers to act like humans

How could the following line of code be shortened?

average = average + 1

Group of answer choices:

1.average + a

2.average += 1

3.average = + 1

4.average = 1 + average

Answers

Answer:

2

Explanation:

The second option is the only one that will work. The last would work but doesn't make the code any shorter.

Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.

What role of line of code if shortened?

It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.

By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.

Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.

Therefore, The second option is the only one that will work.

Learn more about line of code here:

https://brainly.com/question/18844544

#SPJ2

how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}

Answers

Answer:

scanf(" %c" ,&op); //entering operators such as + - \ *

Explanation:

put space before %c

Other Questions
What is inside a bacteriophage?O proteinO DNAO carbohydrateO lipid Why are invasive species considered a threat to native wildlife? how did europe in ruins affect europe In what container can you not see the meniscus (GIVING BRAINLIEST TO FIRST CORRECT ANSWER!!)find the volume. Mr. Jacobsen is an electrical engineer. He earns 150,000 (GROSS) a year. He pays 20% income tax. How much income tax does he pay? The sum or difference of p and q is the of the x-term in the trinomial.a. ss. www. coefficients solve this system of equations using substitution, show your work (ANSWER QUICK PLEASE) Part 1: Effective CommunicationWrite a 150- to 200-word response to the following scenario and questions:Your class requires you to use a program you must download on your computer. You have waited until day 5 of the week to download the program, and you need it for an assignment that is due in 2 days. Now you are having issues with the program. How do you approach solving this problem? Whom would you contact first, and why? What are the resources available to support you when obstacles arise? Why is effective communication important in linking you to these resources?Part 2: College Writing ProcessWrite a 150- to 200-word response to the following questions: When you have an essay due in an upcoming course, how will you manage your time to ensure you are able to complete all 5 steps of the writing process (prewriting, organization, drafting, revising, and editing)? How can you apply what you have learned about the college writing process to enhance the effectiveness of your written communication in the workplace?Part 3: Academic IntegrityAccess the Center for Writing Excellence. Review the following resources under the Academic Integrity heading: Plagiarism Tutorial Student Code of Academic Integrity APA Style: Plagiarism GuideWrite a 150- to 200-word response to the following questions: What are 2 examples of violations of the Student Code of Academic Integrity? What resources on plagiarism available to you as a student would be most useful in preventing each of these 2 examples of violations? Why is integrity important in your professional life? How do you put integrity into practice in your professional life? Carmen received a gift of $5,000 from her grandmother and decided to invest it. the expression 5000(1.0005)^12t represents the amount of the money carmen is earning on her investment. carmen wants to write an equivalent expression so that she can better understand how her money is being invested. choose an equivalent expression in each drop down. Choose the set of numbers with an average of 9.A) 3, 5, 7, 8, 12B) 2, 3, 6, 13, 16C) 2, 4, 8, 11, 20 Put the equation below into vertex form.y=(x+9)(x+25) 1). 15workers can dig a well in 16 days.how long will it take to dig the well by 20 workers?2). 24 men can do a piece of work in 15 days. in how many days can 45 men do another piece of work 2 times as great maths grade 8 solution What's 26% of 600, I will give brainiest The speed of 10 cars on a certain highway stretch was recorded below. If the mean of the data is 63.2 with a standard deviation of 6.2, circle all data values with a z-score less than 0.5.{49, 58, 60, 63, 64, 64, 65, 67, 70, 72} Whats the difference between transcription and transcription? A family will likely experience institutional completeness if they live in a neighborhood in which they are the only family of their ethnic group. please select the best answer from the choices provided t f Rewrite the following question using the inversion:Qui est-ce qui parle? (PLEASE HELP- if you have knowledge of this question) What was an important facet of the NATO treaty meant to strengthen the alliance?A. An attack against one member would be considered an attack against all the members.B. Nuclear weapons may be used if the Soviet Union overthrows anydemocracyC. Member countries of NATO would have a shared currency.D. Any country challenging the United States can't be a member of NATO.