Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Conversion of decimal number 10.625 into binary number ?
Ans. There is integer part is 10 and fractional part is 0.625. Firstly convert the decimal number 10in its equal binary number that is, divide 10 with 2 until the quotient becomes 0 shown in table.
Quotient
Remainder
10
2
5
0
1
Therefore, the integer part 10 is equivalent to binary number 1010. After that convert the decimal fractional part 0.625 in its binary form that is, multiply 0.625 with 2 until the remainder becomes 0.
Therefore, the decimal fractional part 0.625 is equivalent to binary number 0.101. Thus the decimal number 10.625 is equivalent to binary number 1010.101.
In this part you are required to review and critique a website of a café or a restaurant of your choice. Your report should be a minimum 500 words with a maximum of 1000 words. You
what is fresnel''s biprism?how it is used to determine wavelength of monochromatic source of light
Give example of bus and memory transfer For example, the read operation for transfer of a memory unit M from address register AR to another data register DR can be illustrated
Explain what is DTMF signalling. Dual Tone Multi Frequency (DTMF) was initially introduced in 1963 with 10 buttons into Western Electric 1500 -type telephones. Dual Tone Multi
What is guard bits? Guard bits are extra bits which are produced while the intermediate steps to yield maximum accuracy in the final results.
Design a BCD to seven segment decoder that accepts a decimal digit in BCS and generates the appropriate output for segments in display indicator. Ans: BCD-TO-seven-Segment
What are Addressing Modes Many of instructions that a computer actually executes during running of a program concern movement of data to and from memory. It is not possible sim
WebLogic JMS handles cluster-wide, transparent access to destinations from any server in the cluster. A system administrator can set up cluster-wide, transparent access to destinat
De Morgan's Laws Continuing with the relationship between ∧ and ∨ , we can also use De Morgan's Law to rearrange sentences involving negation in conjunction with these conne
Q. Explain about wildcard character in DOS? Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd