What is the binary of the following numbers
10
6
22
12

Answers

Answer 1

You can use this table to help you!

Answer:

10 = 00001010

6 = 00000110

22 = 00010110

12 = 00001100

What Is The Binary Of The Following Numbers 1062212

Related Questions

Steps of booting a computer

Answers

Steps of Booting
The Startup. It is the first step that involves switching the power ON. ...
BIOS: Power On Self Test. It is an initial test performed by the BIOS. ...
Loading of OS. In this step, the operating system is loaded into the main memory. ...
System Configuration. ...
Loading System Utilities. ...
User Authentication.

type of software designed for users to customise programs is?

Answers

Answer:
So easy the answer is Freeware
Explanation:

Most graphics software programs give you the choice to work in either RGB or CMYK. What are these specifications called?
A.
digital codes
B.
color spaces
C.
computer graphics
D.
artwork

Answers

A - digital codes

Hope I’m right

Answer:B

Explanation:

In programming 2+6 is an example of what math

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.

which is considered both an input and output device?
A) Keyboard
B) Microphone
C) Speaker
D) Touchscreen Monitor
Please hurry :3 15 points

Answers

Answer:

speaker

Explanation:

its the one that gives sounds

Answer:

The answer would be D) Touchscreen Monitor

Explanation:

A Touchscreen monitor (such as a smartphone screen) outputs information to the user, while also recieving information from the user.

// This pseudocode segment is intended to compute and display
// the average grade of three tests for any number of students.
// The program executes until the user enters a negative value
// for the first test score.
start
Declarations
num test1
num test2
num test3
num average
housekeeping()
while test1 >= 0
mainLoop()
endwhile
endOfJob()
stop

housekeeping()
output "Enter score for test 1 or a negative number to quit"
return

mainLoop()
output "Enter score for test 2"
input test2
average = (test1 + test2 + test3) / 3
output "Average is ", average
output "Enter score for test 1 or a negative number to quit"
input tesst1
return

endOfJob()
output "End of program"
return

Answers

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

The errors in the pseudocode

The errors in the pseudocode include:

Inclusion of unusable segmentsIncorrect variablesIncorrect loops

The correct pseudocode

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

https://brainly.com/question/11623795

It is possible to publish a presentation online. True False

Answers

Answer:

It should be true

Explanation:

I don't see why it wouldn't

Which of the following are vector graphic file formats? Choose all that apply.

AI

PNG

RAW

SVG
Please help

Answers

There are different kinds of files. The option that is a vector graphic file formats is SVG.

What are vector files?

Vector files are known to be a type of images that are created by using mathematical formulas that stands as points on a grid.

The SVG  is known as Scalable Vector Graphics file and it is known to be a  vector image file format as it make use of geometric forms such as points, lines, etc.

Learn more about vector graphic file from

https://brainly.com/question/26960102

Answer:

AI and SVG

Explanation:

learned it from a comment i give all credit to them

9) Which date is assigned the serial number of 1?


A. January 1, 1700


B. January 1, 2000


C. January 1, 1900


D. January 1, 1800

Answers

Answer:

c) January 1, 1900

Explanation:

January 1, 1900 (1 - 1 - 1900) is assigned the serial number of 1. The serial number 1 represents January 1, 1900. Hence, option (c) is the correct answer.

Text based game project 1

Answers

Answer:

What is your question?

Explanation:

1. What is TRUNC for Delphi
programming language?
Please explain in at least 200
words.

Answers

The Trunc function cut off a floating-point value by removing the fractional part. The Trunc  function often brings back an integer result as it is not a real function.

What is the Trunc function in Delphi?

When you look at the Delphi code, the Trunc function is known to be a fuction that reduces or cut off a real-type value and make it into an integer-type value.

Note that X is a real-type expression and so the Trunc is said to often brings back an Int64 value that is meaning the value of X approximated to zero and when the cut of value of X is not found in  the Int64 range, an EInvalidOp exception is brought up.

Learn more about programming language from

https://brainly.com/question/8151764

what is containment and why is it part of the planning process

Answers

Answer:

Isolating affected channels, processes, services, or computers; stopping the losses; and regaining control of the affected systems. It is part of the planning process to identify the best containment option for each scenario or system affected.

Explanation:

Which of the following are logical functions? Select all the options that apply.

Answers

Answer:

functions (reference)

Function Description

IFS function Checks whether one or more conditions are met and returns a value that corresponds to the first TRUE condition.

NOT function Reverses the logic of its argument

OR function Returns TRUE if any argument is TRUE

What year was internet inverted

Answers

[tex]\large\blue{\mid{\underline{\overline{\tt { →\:January \:1, 1983}\mid}}}}[/tex]

ARPANET→Advanced Research Projects Agency Networkthe forerunner of the Internet.

[tex]\purple{\rule{15mm}{2.9pt}} \red{\rule18mm{2.5pt}} \orange{ \rule18mm{2.5pt}}[/tex]

[tex]\sf{\:мѕнαcкεя\: ♪...}[/tex]

Consider the following program written in C syntax:
void swap(int a, int b) {
int temp;
temp = a;
a = b;
b = temp;
} void main() { int value = 2, list[5] = {1, 3, 5, 7, 9};
swap(value, list[0]);
swap(list[0], list[1]);
swap(value, list[value]);
}
For each of the following parameter-passing methods, what are all of the
values of the variables value and list after each of the three calls to
swap?
1. Passed by value
2. Passed by reference
3. Passed by value-result
6.

Answers

The values of the variables value and list after each of the three calls to

swap are:

value = 2 and  list[5] = {1, 3, 5, 7, 9};value = 2 and  list[5] = {3, 1, 5, 7, 9};value = 2 and  list[5] = {3, 1, 5, 7, 9};

How to determine the values of variable value and the list?

1. Passed by value

In this case, the values of the actual arguments remain unchanged; So the variable value and the list would retain their initial values

The end result is:

value = 2 and  list[5] = {1, 3, 5, 7, 9};

2. Passed by reference

With pass by reference, the arguments are changed.

Given that

value = 2 and  list[5] = {1, 3, 5, 7, 9};

The value of variable value is swapped with list[0].

So, we have:

value = 1 and  list[5] = {2, 3, 5, 7, 9};

Then list[0] and list[1] are swapped

So, we have:

value = 1 and  list[5] = {3, 2, 5, 7, 9};

Lastly, value and list[value] are swapped

So, we have:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

The end result is:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

3. Passed by value-result

Since there is no loop in the program, the pass by value-result has the same output as the pass by reference.

So, the end result is:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

Read more about C syntax at:

https://brainly.com/question/15705612

I of 60
MUL
FINISI
a
The view in which the field data types and field properties for a database table can be seen in Microsoft
Access is called the...
0.5 POINTS
A
00
Datasheet view
B
design view
с
D
SQL view
dashboard view
E
field view

Answers

The view in which the field data types and field properties for a database table can be seen in Microsoft Access is called the Datasheet view.

What is datasheet view?

A datasheet form is known to be the view that shows a user the information recorded using a table.

Note that the properties of a field tells users the characteristics and attributes of data added to that field. A field's data type is therefore a vital  property as it helps one to know the kind of data the field can save.

Learn more about database  from

https://brainly.com/question/26096799

a) Explain any two problems associated with the existing system used by the organization. (25 marks)​

Answers

Answer:

Lack of Strategy

Many of the most common MIS issues can be traced back to a lack of a solid strategy. Information systems leaders are well aware of the many tools available to gather data on their network. But putting that information to use is often a challenge.

At one time, technology departments served as a separate operation, providing tech support and keeping an organization’s server equipment running. Today, MIS leadership often sits alongside other business leaders, working together to ensure that the technology being used supports the overall mission of the company moving forward.

Meeting Organizational Needs

MIS plays an ever-increasing role in organizations, with professionals relying on technology for every aspect of operations. Sales and marketing rely heavily on customer relationship software to track client interactions, for instance, while accounting needs its own software for billing, invoicing and financial tracking.

With more than half of all companies now relying on big data analytics, MIS is playing an even more important role. Before making a decision, today’s management teams are likely to pull reports on existing activity to ensure they use facts rather than make educated guesses.

Explanation:

A victimless crime is committed when
|. Select 3 options.
someone downloads a pirated song or video
a copyrighted image is used without permission
a stranger accesses your internet banking
a person downloads and uses pirated software
a hacker sells a company's financial statements

Answers

Someone downloads a pirated song or video a copyrighted image is used without permission and a person downloads and uses pirated software.

A victimless crime is committed when a copyrighted image is used without permission 2. a stranger accesses your internet banking 3. a hacker sells a company’s financial statements.

Victimless crimes are illegal acts that break the laws, but there is no single victim of the crime. They are against social values and laws. A copyrighted image is used without permission

Examples are gambling, traffic violations, etc. Thus, Victimless crimes differ from other types of crime because it does not have an identifiable victim. This crime is against laws and social values and beliefs.

To know more about victimless crimes, visit:

brainly.com/question/17251009

#SPJ6

Put the steps of the decision-making process in the correct order.
1. Step 1
Gather data.
2. Step 2
Analyze choices.
3. Step
Make the decision.
4. Step 4
Evaluate the decision.
5. Step 5
Determine the goals.

Answers

Answer:

step 5, step 1, step 2, step 3, step 4

Explanation:

I belive that would be the answer. I hope this helps.

Explain why database management systems are used in hospitals? Discuss

Answers

The reason why database management systems are used in hospitals is because the use of Healthcare databases aids in terms of diagnosis and treatment, handle documentation and billing, and others.

What is a database management system in healthcare?

A database management system (DBMS) is known to be a type of software that has been developed to help people to form and keep databases.

It is one that helps to lower the risk of errors associated with medical operations and management. It reduces  paperwork and staff and also improves  performance.

Learn more about database management from

https://brainly.com/question/24027204

Define a function FindLargestNum() with no parameters that reads integers from input until a negative integer is read. The function returns the largest of the integers read

Answers

The FindLargestNum program is an illustration of function; where its execution is done when its name is called or evoked

The function FindLargestNum

The FindLargestNum function written in Python, where comments are used to explain each action is as follows:

#Thie defines the FindLargestNum function

def FindLargestNum():

   #This gets the first input

   num = int(input())

   #This initializes the minimum value

   maxm = num

   #The following is repeated until the user enters a negative input

   while num >= 0:

       #This determines the largest input

       if num > maxm:

           maxm = num

       #This gets the another input

       num = int(input())

   #This prints the largest input

   print(maxm)

Read more about functions at:

https://brainly.com/question/24941798

20
Select the correct answer
Mike logged into a shopping website and entered his username and password, which protocol will the website use to verify his credentials?
A HTTP
B SMTP
C. СМР
D. POP3
E. LDAP

Answers

Answer:

LDAP

Explanation:

The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral application protocol used to maintain distributed directory info in an organized, easy-to-query manner. That means it allows you to keep a directory of items and information about them. This allows websites to verify credentials when accessing websites.


Why do crawlers not use POST requests?

Answers

Answer:

Generally they do not do POST requests. This is just the current state of affairs and is not dictated anywhere, I believe. Some search engines are experimenting with crawling forms, but these are still GET requests.Explanation:

How can use of the Internet potentially be a security issue?

Programs, such as spyware, are mistakenly accessed by visiting an infected
website.
Individuals called viruses attempt to secretly enter another computer to harm it.
Phishing attempts to get someone's personal data with fake emails and social
media requests.
Unwanted software called hackers can transmit personal data from a computer.

Answers

Answer:

Unwanted software called hackers can transmit personal data from a computer.

Explanation:

The other options mention "attempt" meaning it hasn't happened yet. So I'm going to assume the last one is right. I'm not 100%

Fumiko is a network technician. She is configuring rules on one of her company's externally facing firewalls. Her network has a host address range of 192.168.42.140-190. She wants to allow all hosts access to a certain port except for hosts 188, 189, and 190. What rule or rules must she write

Answers

The rule that she must write is that  A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

What is a Firewall?

A firewall is known to be a form of a network security device that helps one to manage, monitors and filters any form of incoming and outgoing network traffic.

This is often done based on an firm's formerly set up security policies. A  firewall is known as the barrier that exist between a private internal network and the public Internet.

See options below

What rule or rules must she write?

a) A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

b) Multiple rules are necessary for this configuration; one or more rules must define Deny exceptions for 188, 189, and 190, followed by the Allow rule for the 140–190 range.

c) A Deny rule is needed for 188, 189, and 190, and then exception rules for the 140–187 range.

d) The default Deny all rule needs to be placed first in the list, and then an exception rule for the 140–187 range.

Learn more about firewalls from

https://brainly.com/question/13693641

6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick

Answers

Answer:

Plotters

Explanation:

A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that

explains why it is important to select the correct data when creating a chart

Answers

Answer:

to be organized

Explanation:

because when you are organized to select the correct data, you won't confused

Two gamers are programming each player in a football team to throw a football
across the stadium at a specific speed to arrive at the running back's hand. Which is
the parameter and which is the argument in the code below?
The parameter and argument are the same, speed by 5 or 2
The parameter is speed, the argument is 5 or 2
The parameter is 5 or 2, the argument is speed
There are no parameters or arguments

Answers

The parameter and  the argument in the code below is that the parameter is speed, the argument is 5 or 2.

Can programmers be said to be gamers?

Gaming is known to be a kind of starting point for new set of programmers  as a lot of game designers do uses different kinds of skills.

Note that in the above scenario, it the parameter is speed, the argument is needs to be 5 or 2 for it to work well.

Learn more about code  from

https://brainly.com/question/25605883

which of the following is an example of application software

Answers

Answer:

A messaging app

Explanation:

Its an software application you can download, so...yeah.

(You might've thought it was an anti-virus program lol)

Option-D.A messaging app is the correct answer.
A messaging app is an application software that can be installed jn your phone and computer in order to send messages.

What is an Application software?Application software is a type of computer application that performs specific professional, academic, and individualized functions.Each software is designed to assist users with a variety of tasks, some of which may be related to productivity, creativity, or communication.Word processors, media players, and accounting software are examples of application programs.An application program (also known as a software application, application, or app for short) is a computer program created to carry out a specific task other than one related to the operation of the computer itself.The term "app" typically refers to apps for mobile devices such phones. Applications may be published independently or packaged with the computer and its operating system software.They may also be written in proprietary, open-source, or project code.An application can work with text, numbers, audio, visuals, and a combination of these depending on the task for which it was created.Word processing is an example of an application package that focuses on a particular task.On the other hand, integrated software merges several programs.

To learn about the DIfference between application software and Opertaing system click here-
https://brainly.com/question/17798901

#SPJ2

You can always trust information that comes from websites ending in. . com

Answers

Answer:

No, Don't go there I can name more than 3 websites that end in ".com" that u cant trust.

Explanation:

Other Questions
At a temperature of 273K, a 400 mL gas sample has a pressure of 760 mm Hg. If the pressure is changed to 380 mmHg, at which temperature will this gas have a volume of 551mL? How many points is each Fitness Log worth?A. 50B. 20C. 65D.0 What is the author's main purpose in writing the speech? *to offer the audience a explanation of the reasons for accelerating the United Statesspace programto update the audience with information about problems in the United States spaceprogramto inform the audience of the number of jobs created by the expansion of the UnitedSpace space programto tell the audience about the economic benefits of the United States space program Pls help with question 10 When have you thought about leaving your comfort zone, but decided not to? Give at least one example. How did you feel about your decision? Factor the polynomials completely, then solve 48x - 75 = 0 A sample of iron having a mass of 93.3 g is heated to 65.58 oC and is placed in 75.0 g of water raising the temperature of the water from 16.95 o C to 22.24 o C. Find the specific heat capacity for this iron sample. (Specific Heat of Water (C) = 4.184 J/go C) Why is it essential for you to learn about HIV/AIDS?(help me i gotta send this by tomorrow Find the slope of the line that is parallel and perpendicular to the following equation.2x-2y=-6 Select the correct answer.Alejandra is packing a bag for a flight. The airline has a baggage welght limit, and Alejandra has already packed her bag with some essentials. Allshe has left is her outfits and shoes, which must weigh less than 30 pounds total.If Alejandra estimates that one outfit welghs two pounds and one pair of shoes welghs three pounds, which graph represents the number ofoutfits and shoes that Alejandra can pack while staying under the weight limit? ASAP HELP I need to turn this in What factors are important in affecting public opinion? What is the classification of the pair of angles shown?F. complementaryG. supplementaryH. verticalI. no relationship Which of these types of fertilizers is the best for maintaining the long-term health of farm soil? (select all that apply) organic matter compost chemical fertilizers water, i have no idea what subject this is in so i put biology. The outer layer of the earth's core is about 1,400 miles thick.TrueFalsePLS HELP!!!!! If f(x) -X-3and g(x) = 5x - 4, what is the domain of (fg)(x)? Suppose this two-dimensional figure is rotated 360 degrees using the vertical axisshown. Each small square on the grid represents 1 square inch. What is the volume ofthe three-dimensional figure? (2pts)A. 41.89 inB. 33.51 inC. 62.83 in 3D. 37.70 in3 What is:4m+32mPS: This is a quick question/giveaway find the area !please hurry! Thank you! 5.5 - Solving Quadratic Equations - Perfect Square Trinomials and Difference of SquaresFactor the following if they are a perfect square trinomial or a difference of squares.a) x^2 + 24x + 144 = 0b) 9x^2 - 36x + 36 = 0c) x^2 - 64 = 0d) 4x^2 - 81 = 0