1. (1001010)2 – (10100)2 perform.​

Answers

Answer 1

Given:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

To find:

value=?

Solution:

[tex]\to \bold{(1001010)_2 - (10100)_2}[/tex]

In this first, we convert the given binary number to the decimal number:

Converting [tex]\bold{(1001010)_2}:[/tex]

[tex]\to \bold{1 \times 2^6+0\times 2^5+0\times 2^4+1\times 2^3+0\times 2^2+1 \times 2^1+0\times 2^0}\\\\\to \bold{1 \times 64+0\times 32+0\times 16+1\times 8+0\times 4+1 \times 2+0\times 1}\\\\\to \bold{64+0+0+ 8+0+ 2+0}\\\\\to \bold{64+ 8+ 2}\\\\\to \bold{74}\\\\[/tex]

Converting [tex]\bold{(10100)_2}:[/tex]

[tex]\to \bold{1\times 2^4+0\times 2^3+1\times 2^2+0 \times 2^1+0\times 2^0}\\\\\to \bold{1\times 16+0\times 8+1\times 4+0 \times 2+0\times 1}\\\\\to \bold{16+0+ 4+0 +0}\\\\\to \bold{16+ 4}\\\\\to \bold{20}\\\\[/tex]

Subtracting the value:

[tex]\to \bold{74-20=54}[/tex]

After converting the 54 into a binary number we get: [tex]\bold{(110110)_2}[/tex]

So, the final answer is "[tex]\bold{(1001010)_2 - (10100)_2}= \bold{(110110)_2}[/tex]"

Learn more:

brainly.com/question/23729089

1. (1001010)2 (10100)2 Perform.

Related Questions

Aaden went to the zoo and he was fascinated by the platypuses and wants to learn more about them. What is the best online resource Aaden could use to find this information quickly?

An online animal encyclopedia
A subscription to an online animal magazine that costs money
A brochure from the zoo
An animal outreach section of an online newspaper

Answers

Answer:

An online animal encyclopedia

Explanation:

Encyclopedias are the most reliable source on this list, as they are normally peer-reviewed and checked for falsities.

Outline the steps that you will use to save your document in the format below.
a. Portable document file
b. Webpage(HTML)​

Answers

Answer:

I have experience in coding, let me answer

Explanation:

Which ever application ur using, go to the top left corner and look for save and name it as a file for html. For example (food.html) or (food.pdf)

Full from of tmc computer

Answers

Answer:

Traffic Message Channel,

Answer:

Traffic Message Channel

Explanation:

I hope its your answer

help me to solve please​

Answers

Explanation:

Pendrive - small external hard disk

ROM - read only memory - cannot be changed info

printer - produces the hard copy output

mouse - points and selects GUI

ALU - mathematical calculations

Answer:

Explanation:

mouse:points and selects GUI objects.

printer:It produce the hard copy output.

ALU:performs mathematical calculations.

ROM:the instructions stored in it can not be

changed by user.

Pendrive:it can be considered as a small external

hard disk.

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

the type of memory whose contents are lost when electricity is cut off​

Answers

Answer:

RAM its volatile memory

RAM, thanks me pls bro

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

The process of determining the running time and memory cost of an algorithm by reading the code and creating a mathematical formula expressing this cost is known by what term

Answers

Answer:

Complexity Analysis is the process of determining the running time and memory cost of an algorithm by reading the code and creating a mathematical formula expressing this cost.

Explanation:

...

What are general purpose computer and special purpose computer?​

Answers

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

Answer:

general purpose computer are designed to be able to perform variety of task when loaded with appropriate program.

special purpose computer are design to accomplish a single task.

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

TRUE OR FALSE
Mark I was the first working computer.
PLEASE ANSWER FaST

Answers

the answer is false, it was the ENIAC machine
The fast answer is FALSE

Difference between pointer and cursor

Answers

Answer:

The difference between Cursor and Pointer. When used as nouns, cursor means a part of any of several scientific instruments that moves back and forth to indicate a position, whereas pointer means anything that points or is used for pointing. Cursor is also verb with the meaning: to navigate by means of the cursor keys.

Explanation:

Hope it helps you

write about the various components of Windows operating system​

Answers

Answer:

The main components of the Windows Operating System are the following:

Configuration and maintenance.

User interface.

Applications and utilities.

Windows Server components.

File systems.

Core components.

Services.

DirectX.

Explanation:

who are your favorite You tubers mine are the Dobre Brothers

Answers

Answer:

mine are H2O delerious and Lazar beam

Explanation:

I enjoy watching watching whatever comes up on my recommended page   :)

Write a short note on the fifth generation computer​

Answers

Answer:

It's component is bio chips.

It is used in present-future.

I think operating speed is Mili second.

what is text or picture behiind the document called ?​

Answers

Attachment
It’s called an attachment

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

Which office if known for getting their students book grants.

Answers

Answer:

library

have a great day ❤️

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

UNIT 1 ACTIVITY

Troubleshooting

Part A

When your friend DaJuan turns on his computer, he hears four beeps. The computer

won't fully boot. DaJuan has a Dell computer with a quad core processor and has

recently upgraded his RAM.

Apply the troubleshooting methodology to help DaJuan understand and resolve his

problem. The steps of the methodology are listed for you. You can write directly on

the write suggestions for DaJuan at each step.

1. Identify the Problem (beeps are key here)

2. Internet Research

3. Establish a Theory of Probable Cause

4. Test the Theory

5. Establish a Plan of Action

6. Implement the Solution or Escalate

7. Verify Full System Functionality

8. Document Findings

Answers

Answer:

all of the above

Explanation:

computer that process digital as well as analogue signals​

Answers

Answer:

Hybrid Computer is the computer that process digital as well as analogue signals.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

Fill in the blanks
Electricity have 2 district states ...........and................
A....... software is the software developed by the prograammers using high level language

Answers

Answer:

application software is the software

What is the full form of SSD?​

Answers

Answer:

Solid state drives

Explanation:

The type of storage your computer uses matters for performance, including power usage and reliability. Solid state drives (SSDs) and hard disk drives (HDDs) are the two main storage options to consider.

I hope this will help you :-)

Which classic video game, developed and published in 1987, featured four youths called the Light Warriors?

Answers

I believe it is called Final Fantasy.

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

Direction: Enci
1. UNIVAC is​

Answers

Answer:

UNIVAC is Universal Automatic Calculator.

It was inveted by Presper J. Eckert and John W. Mauchly, in 90' s

Explanation:

[tex].[/tex]

WAP to find the area of cuboid​

Answers

Answer:

from the top make it drop

Explanation:

to find the area

just mesing hear is ur answer

Other Questions
Reason abstractly. Can the product of adecimal number less than I ever be greater than the wholenumber? Give examples to support your answer.find the product 4.2(6 + 0.43). HELP PLEASE What is 4 tens, 2 ones, 7 tenths written in standard form? PLEASE DONT LIE Rachel bought 2.5 pounds of cookies for $13.40. Her friend buys 4.5 pounds of crackers for $24.75. Which is lessexpensive per pound? By how much? (HINT: Find the unit rate for each, then find the difference) I WILL GIVE BRAINLIEST Explain why variation is an advantage for a species such as the common emerald dove Question 8 of 10What female rap crew was the first to have huge success in hip-hop?A. ShantB. RoxanneC. Salt-n-PepaD. FugeesSUBMIT 48. Choose which of the underlined wordsare spelled correctly:A. Summer is to short!B. Summer is two short!C. Summer is too short! What is the name of the typical keyboard? Julie wants to draw square that has an area of 17 in. what is the exact length of a square with this area Tell me about a time when you were able to understand a different point of view. Describe the situation, your actions, and the outcome. A Rohmbus has an area of 40 cm^2 and adjacent angles of 50 degree amd 130 degree. Find the length of a side of rohmbus Solve by completing the square.[tex]6 {b}^{2} + 12b - 14 = 0[/tex]Please show all work! Someone plz help me !!Science OrBias? this is urgent ill give you brainliest and 25 ponts but helpppi need a hypthosis idea and an experiment that might prove it i dont want one thats over popular im free to any kind of hypotheses not just science A brick has a mass of 100 G and a volume of 25CM3 what is the density of the brick Information about the life in rural areas Find the indicated length underline the adjective causes in the following sentences and circle the nouns they describe The midpoint of the line segment connecting the points (0,0) and (5, -6) is: (5, -6) (2.5,-3) (25, 36) (0,0) When addressing a stranger in French, one should always use the "tu" form of the verb. True or false Imagine a situation in which a firm owes its creditors $50,000 but the firms assets are only worth $40,000. Equity holders have an incentive to take on very risky projects because if they do nothing, they are certain to be wiped out, while debt holders have incentive to avoid risky projects. Which of the following theories is appropriate to represent this situation?a. The static tradeoff theoryb. An agency costc. A product market modeld. The asymmetric information of debtholders and equity holders