Why are rules required for a number system to be useful?

Answers

Answer 1

Answer

This is because without them no one would know how much each symbol represents, and no one would be able to decipher the message.

Explanation

Number system is a way to represent numbers. It  is a writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner.

In computing or in a computer number systems are the techniques which represents numbers in the computer system architecture where   every value that you are saving or getting into/from computer memory has a defined number system.Computer architecture supports  . Binary number system,Octal number system and Decimal number system.

Answer 2

Rules are required for a number system because computers relay on number system and its Basics of Computers - Number System. The method to represent and work with numerals is called number system. Decimal number system is the most commonly used number system which is used in our daily lives but computers do not understand this system. Some of popular number systems that computers consists are binary number system, octal number system, hexadecimal number system, etc.

Further Explanation:

⦁ Computers uses different number systems, that is why we have different rules for every different number systems, for every number system to be understandable to computers, we clearly need to define specific rules to follow for computation.

⦁ There are four main types of number systems, Decimal, Binary, the Octal and the Hexadecimal.

⦁ Binary Number System: An example of basic number system that computer uses is binary number system, based on number system of 2 digits (base two), which is 0 and 1. Its considered as perfect numbering system for computers and computers relay on this number system.

⦁ Decimal Number System: is a base 10 number system, which is consists of 10 digits from 0 to 9, that w use in our daily lives,  This means that any numerical entity can be represented using these 10 digits. Decimal number system consists of ten single-digit numbers.

⦁ The Octal Number System: The octal numeral system defined as the base-8 number system, which uses the digits 0 to 7. Octal numerals can be made from binary numerals, it is made by grouping consecutive binary digits into groups of three (start from the right to left).

Answer details

Grade: High School

Subject: Computer Science and Technology

Chapter: Binary Mathematics

Keywords: number systems, binary mathematics, binary number system, octal number system, decimal to binary conversion etc


Related Questions

Which defensive technique involves the server sending a wrong syn+ack to the client, so the client sends and rst packet notifying the server of an error? this makes the server think the client request is legitimate?

Answers

 Which defensive technique involves the server sending a wrong syn+ack to the client, so the client sends and RST packet notifying the server of an error? this makes the server think the client request is legitimate? Answer is an RST cookie

1. Which of the following accurately describes a piece of work that contains a Creative Commons: No Derivative Works license?

A. It can be copied, distributed, and displayed as long as the author is credited.
B. It can be copied, distributed, and displayed as long as no other version of the work is created.
C. It has been made available for any use in any piece of work that is also put in the public domain.
D. It has been made available to the general public for any use at no charge.



2. Which of the following accurately describes a piece of work that contains a Creative Commons: Share Alike license?

A. It can be copied, distributed, and displayed as long as the author is credited
B. IT can be used for any noncommercial use without attribution or cost
C. It has been made available for any use in any piece of work that is also put in the public domain
D. It has been made available to the general public for any use at no charge



3. Which of the following copyright licenses is most appropriate if you create a video that you want to make available to anyone for any use unless they're going to use it to make money?

A. All Rights Reserved
B. Public Domain
C. Some Rights Reserved: Noncommercial
D. Some Rights Reserved: Share Alike

Answers

1. B
2. C
3. C
Just did the test, these are the right answers!

1. The answer is: B. It can be copied, distributed, and displayed as long as no other version of the work is created.

No derivative works liscense are made when a certain content creator allow is content to be used by other people without having to make any payment to the content creator. But, legal issues would arise if the other users try to make the content appear as their own.

2. The answer is: C. It has been made available for any use in any piece of work that is also put in the public domain

The share alike license allows other users to freely copied and distribute the content, But they had to appropriately credited the original creator every time they share it. The users may have the option to not mention original creator if they pay a certain amount of money to the original creator.

3. The answer is: C. Some Rights Reserved: Noncommercial

Putting the content creation as 'some rights reserved: Commercial' only limit the monetization rights of the content to the original creators. in this type of copyright license, other users may have the right to monetize it if they arrange a certain type of revenue sharing system with the original creator.

How can vlan hopping attacks be prevented on a network?

Answers

The solution is to disable auto trunking and move native VLANs to unused VLANs.

VLAN hopping is a PC security misuse, a strategy for assaulting networked assets on a virtual LAN (VLAN). The fundamental idea driving all VLAN hopping assaults is for an assaulting host on a VLAN to access traffic on different VLANs that would ordinarily not be accessible.



In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
in a folder named “images”
in any folder on the web server
at a URL available on the Internet
in the same folder as the HTML file

Answers

It should be in the same folder as the HTML file

The correct option is this: IN THE SAME FOLDER AS THE HTML.
An HTML file refers to a file that is made up of Hypertext Markup Language. The HTML file is made up of title and body. In an HTML document, tags are usually linked to the text and the image in the document. The Image tag in HTML file is usually stored in the same folder as the HTML file.

Group technology identifies components by a coding scheme that specifies the

Answers

Group technology identifies components by a coding scheme that specifies the variable

Define the types of objects that can be stored in active directory, such as user or computer accounts.

Answers

Schema classes define all objects that AD can handle.

Brian has to manage a project with tight deadlines. Help him arrange the stages of project management in the correct sequence.

Answers

I think it is 2, 4, 1, 5, 3 the numbers are the cards down

Answer:

plato users

Explanation:

1  initiation

2 planning

3 execution

4 monitor and control

5 closure

 

A database designer needs to be concerned about what fields might be needed rather than the file size

Answers

The answer to this statement is true because they should be more focused on the data of the data base in which should be detailed and that they should have all the design choices that they need when creating the database design which include the fields in creating it.

I really need help on this one PLEASE!

1. How is the frustration of a poorly designed interface avoided?
A:By giving it the same care and attention as other designs
B:By making it visually appealing
C:By making the database very long but detailed
D:By providing instructions on how to use the interface

2. Which of the following is a visual element that links a user with the tools and functionalities of a computer program?
A:Code
B:Interface
C:Logo
D:Menu

3. What do WYSIWYG interfaces shield users from?
A:Code
B:Content
C:Links
D:Menu items

4. Which of the following is an important initial step in designing an interface?
A:Audience analysis
B:Creating discussion boards
C:E-mail functions
D:Setting up links

5. Which of the following are examples of WYSIWIG interfaces?
A:JavaScript used to create parts of a web page
B:Database queries
C:HTML code used to create web pages
D:Menu system of a video game console

6. What should a good interface design incorporate?
A:A very long but detailed menu system
B:Icons and functionalities that reflect the world in which we live
C:Skills that will challenge the user to think
D:Unique, bold visuals that will demand the user's attention

7. WYSIWYG interfaces offer a friendly buffer between which of the following?
A:Code and menu items
B:Code and software applications
C:One user and another
D:Users and technical information

8. Which of the following do most designers believe should be designed first?
A:Detailed user's guide
B:Graphics and icons
C:Underlying structure of the application
D:Visual part of the application

9. Which of the following is a motto graphic designers follow when designing the underlying structure of an application?
A:Application over decoration
B:Design is in the eye of the beholder
C:Form follows function
D:Interface is key

10. What does the menu system on your DVD player illustrate?
A:Interface
B:Link
C:Menu system
D:Search engine

Answers

1) B. Always seek minimized disruption to users in experiencing the interface as the designer is an advocate of the users. 

2) B. Interface. Since WYSIWYG means "What you see is what you get".

3) B. Content. 

4) A. Audience analysis.

5) C. HTML code since WYSIWYG is edited in a form resembled in an appearance to that of printed documents or web pages. 

6) B. It's better to recognize than to recall, that's what users would prefer since it relates more on the real world and they would understand better the functionality of the design. 

7) D. Users and technical information.

8) C. Everything else will depend on the layout and structure of the application.

9) C. Form follows function. It would entice the user to understand what the function is about just by looking at the form.

10) A. Everything has an interface. Basically what one sees as a user is an interface. 

1.How is the frustration of a poorly designed interface avoided?

By giving it the same care and attention as other designs

An interface is a point where two systems , organizations or even subjects among others meet and interact.. To avoid the  frustration of a poorly designed interface it should be given the same care and attention as other designs.

2. Which of the following is a visual element that links a user with the tools and functionalities of a computer program?

Interface

Interface is a visual element that links a user with the tools and functionalities of a computer program. it is a device or a program that enables the user to communicate with a computer. I t helps people to design and implement and also use the computing systems.

3. What do WYSIWYG interfaces shield users from?

Code

WYSIWYG means that what you see is what you get, it is a program editor that allows a developer to see the end results of  process  process he/she has undertaken during the creation of a document. It appears as an electronic document thus a text and graphics is displayed on screen during editing in a way that corresponds exactly to its appearance when printed or displayed as a finished product.

4. Which of the following is an important initial step in designing an interface

Audience analysis

In interface design, Audience analysis is is normally performed by the writer at an early stage of the design  for it consists the information provided  for the purpose of ensuring that every information is provided at appropriate level. Its major importance is ensuring that the tasks to be carried out  in a good, appropriate and accurate manner so as to come up with the desired output.

5. Which of the following are examples of WYSIWYG interfaces?

Menu system of a video game console

WYSIWYG means that what you see is what you get, it is a program editor that allows a developer to see the end results of  process  process he/she has undertaken during the creation of a document.  A video console is a  computer device that outputs a video signal or visual images to display a video game that people can play.So the menu system of a video game console is a an example of WYSIWYG basically because what you see is what you get in this particular interface.

6. What should a good interface design incorporate?

Icons and functionalities that reflect the world in which we live

Design is the process of enhancing user satisfaction with a product by improving the usability and pleasure provided in the interaction with the product.A good interface makes it easy for users to tell the computer what they want to do, for the computer to request information from the users, and for the computer to present understandable information.

7. WYSIWYG interfaces offer a friendly buffer between which of the following?

Users and technical information

A user is a person who utilizes a computer or network service Users of computer systems and software products generally have a general knowledge that helps them understand on the operations of the computer. This is normally simplified by the use of a friendly user interface which is offered by an WYSIWYG interface.

8.Which of the following do most designers believe should be designed first?

Underlying structure of the application

In computing  design  is the use of computer systems for the purposes of aiding the creation , optimizing,modifying or even modifying a design. So Systems design is basically integrating the computer system  so as to help the users  select the right hardware and software products for a particular project, and then develop, install, and implement the system.

This is because the underlying structure is basically what determines the actual look of something.So the designers designs it first so that they can have a clear picture of the final product which is desired by the user or the client.

9. Which of the following is a motto graphic designers follow when designing the underlying structure of an application?

Form follows Function

Form follows function is a principle associated with architecture and design which says that the shape of an object should relate to its intended purpose and function under the graphic design which is the   process of visual communication and problem-solving through the use of typography, photography and illustration.

10. What does the menu system on your DVD player illustrate? Interface

The  menu in the system on the DVD player acts as a user interface because it directs the user on how to operate the DVD easily with ease and it  simplifies things . The menu contains set of commands through which the user communicates with different programs in order to perform different processes.




The protocol that enables computers on the Internet to communicate with one another is called _____.

Answers

perhaps the ethernet

Answer: IP, Internet protocol

Explanation: It decides what information goes where and what it consists of.

I'LL GIBE BRAINLIST AND 56 POINTS!!!!!
Instructions:Drag the tiles to the boxes to form correct pairs.

Match the actions of individuals with the code of conduct they are adhering to.

Tiles
1. Sofia is an HR Manager who keeps all employee records in a password-protected folder.
2. Becky avoids accepting gifts and date or dinner invites from clients or external stakeholders.
3. Maria never uses any office supplies for personal use even she has unlimited access to them.
4. Harold generally shuts off all chat applications in his mobile phone while he's at work.
5. Fred is a multimedia wrist who always uses copyright free items for his design work.

Pairs
ensure diligence in service
avoid legal intrusions
avoid conflicts of interest
preserve confidentiality
maintain integrity

Answers

1. Sofia is an HR Manager who keeps all employee records in a password-protected folder - Preserve confidentiality 2. Becky avoids accepting gifts or date/dinner invites from clients/external stakeholders - avoid conflicts of interest 3. Maria never uses any office supplies for personal use even though she has unlimited access to them - maintain integrity 4. Harold generally shuts off all chat applications in his mobile phone while he's at work - ensure diligence in service 5. Fred is a multimedia wrist who always uses copyright free items for his design work - avoid legal intrusions


Hi there!
1. Sofia is an HR Manager who keeps all employee 
records in a password-protected folder.
Pair: Preserve Confidentiality
2. Becky avoids accepting gifts and date or dinner invites from clients or external stakeholders.
Pair: Avoid conflicts of interest
3. Maria never uses any office supplies for personal use even she has unlimited access to them.
Pair: Maintain integrity
4.  Harold generally shuts off all chat applications in his mobile phone while he's at work.
Pair: Ensure diligence in service
5. Fred is a multimedia wrist who always uses copyright free items for his design work.
Pair: Avoid legal intrusions
Hope this helps and have a great day!

What is the role of the ieee in computer networking and wireless communications?

Answers

An organization that sets standards for computer networking and wireless communications.

Hazardous gas released from a factory’s smokestack is an example of __________ externality.

Answers

Hazardous gas released from a factory's smokestack is an example of NEGATIVE externality. I believe.

Themes are applied from which tab?
a. home
b. insert
c. design
d. transitions 3. how many fonts are in a font theme?
a. 1
b. 2
c. 4
d. it varies

Answers

Themes are selected in different tabs. It varies. 

Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn’t want to pay for a subscription and she wants to pay the least amount of money possible. The applications she plans on using are Word, Excel, and Outlook. Which version of Office do you recommend for her?

Answers

I recommend the Microsoft office 2013 home and student instant license.

Answer:

Microsoft office 2013 Home and Business instant access version

Explanation:

Microsoft office 2013 has different versions like:

Home and student version: this version includes the basic application which are word, excel, power point and one note Home and Business version: this version includes the basic applications which are word, excel, power point, One note including Outlook

it would be better and cheaper for her to buy the Microsoft office 2013 Home and business version since it includes all the applications she wants and she wouldn't have to pay for subscription just a one time purchase money. but if she gets office 365 it might be cheaper but she will have to pay a subscription. the home and student version is cheaper but doesn't have the Outlook application.

To open the find and replace dialog box with shortcut keys, hold down ctrl and press ________

Answers

Hi. To open the find and replace dialog box with shortcut keys, hold down CTRL and press the letter "H"

Hope this helps.
Take care.

This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task

Answers

Answer:

Standard

Explanation:

Answer:

Standard is correct

Explanation:

EDG2021

Which part of the company interacts with customers after they have purchased the product or service?
a. SalesB. HRC. Marketing
d. Customer service?

Answers

I believe it is customer service

Thee answer is Customer service

Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based antivirus software. what type of virus has he discovered?

Answers

I think it is a Polymorphic Virus

The eastern front was longer than other fronts of the war true or false

Answers

the answer would be true
Its true that Eastern front was longer than other fronts of the war. Greater distances and very huge differences between equipment and the quality of opposing armies ensured the fluidity of the front that was lacking in the west. Trench lines could have been easily broken

Which of the following components leads to a slow computer performance
A-Drivers
B-Storage devices
C-CPU
D-Alu

Answers

Probably storage devices

What can a dimm use to hold data and amplify a signal just before the data is written to the module?

Answers

DIMM stands for Dual In-line Memory Module) .It is a module that contains one or several random access memory (RAM) chips on a small circuit board.
DIMM uses registers to hold data and amplify a signal just before the data is written to the module.Today's DIMMs use a 64-bit data path.

what are examples of real-time applications

Answers

Air Traffic Control Systems, Networked Multimedia Systems, Command Control Systems etc. 

The fee the bank charges the depositor of a bad check is... Service fee Below minimum balance fee A returned check fee Non-sufficient funds fee (NSF)

Answers

The non-sufficient fund fee is the fee that the bank charges to someone who ISSUES a bad check.

On the other hand, the returned check fee is the fee that the bank charges to someone who DEPOSITS a bad check

Based on this, the answer to your question is: returned check fee

A bank charges a Non-Sufficient Funds (NSF) fee when a depositor's check is returned due to inadequate funds in their account. This charge is part of the bank's non-interest income, wherein such fees contribute significantly to their revenue, affecting especially the low-income sector of customers.

The fee a bank charges the depositor of a bad check is typically referred to as a Non-Sufficient Funds (NSF) fee. This is one of the types of fees that banks charge to manage the costs associated with processing checks and maintaining accounts. When a check is returned due to insufficient funds in the account, the bank imposes an NSF fee, which covers the administrative cost for the bank to handle the returned check. Unlike nontransaction deposits like passbook savings accounts or negotiable certificates of deposit (NCDs), which either do not allow checks to be drawn or have higher deposit requirements, checking accounts are more susceptible to instances where a check might be returned for lack of funds, thereby prompting such fees.

Banks and financial institutions rely on various charges for non-interest income, which include NSF fees alongside ATM fees, overdraft fees, and late fees, amongst others. These fees represent a significant revenue stream for banks and can impact customers, particularly those who are low-income, as these fees can be high and accumulate quickly if the account balance is not promptly corrected.

Alison is entering text is a word document. As she is entering data, where will the cursor movie in relation to the text she is typing?

Above
Behind
Ahead
Down
Middle

Answers

I believe it is ahead.

Answer:

ahead i think is the anwser

Explanation:

You must start with what mathematical operator to create a formula? A. = B. + C. - D. *

Answers

In Microsoft excel, you must start with the operator "=" to create any formula.
For example: You must type =1+1 and not 1+1 because excel will consider it as a text and not as a mathematical formula.

So the correct answer is A: =

Hope this helps! :)

You must definitely start with a type of operator in Microsoft excel that is known as "=" in order to design any formula. Thus, the correct option for this question is A.

What is the function of the operator in Microsoft excel?

In Microsoft Excel, the function of the operators is determined by the fact that they specify the type of calculation that a user wants to perform on elements in a formula. It includes addition, subtraction, multiplication, or division.

According to the context of this question, if a user wants to perform a simple mathematical operation in Microsoft Excel, like 2 + 2, he/she can definitely begin this operation with the help of the operator "=".

This operator is consequently considered as text not a type of mathematical operation or expression. This is because operators generally specify the type of calculation to be performed on a given set of values.

Therefore, you must definitely start with a type of operator in Microsoft excel that is known as "=" in order to design any formula. Thus, the correct option for this question is A.

To learn more about Microsoft Excel, refer to the link:

https://brainly.com/question/24749457

#SPJ2

A _______ is an administrative grouping of network resources such as computers, printers, and network devices.

Answers

A Domain is an administrative grouping of network resources such as computers, printers, and network devices.

Why might a scientist chose to do fieldwork instead of a laboratory experiment?

Answers

 In a a fieldwork experiment the scientist experimentally examines an intervention in the real world. A scientist might choose a fieldwork instead of laboratory experiment in order to answer for example some behavioral questions. Often  the best observations are made in the field.
A field experiment is more suitable for investigating a wider range of factors affecting the overall result.

Which type of dns resource record should be used to provide name resolution for a host on a network?

Answers

IPv4: A
IPv6: AAAA





-----------------------

Which of the following is NOT an option in the comments group

Answers

I need the options to help you out, thanks. :)
Other Questions
The product of two numbers is 40. if one of the numbers is 5/11, what is the other number? 7x300=7x blank hundreds An atom has 29 protons, 29 electrons, and 35 neutrons. What is the mass number of the atom? The audience of this passage is probably When kelly reprimands sarah each time sarah is late for work, kelly is applying? What is the main difference between the limited and omniscient third-person narrative point of view?A limited point of view is told from the point of view of a minor character of the story.An omniscient point of view allows the reader access to the thoughts of the main character of the story.A limited point of view allows the reader access to the thoughts of all the main characters of the story.An omniscient point of view provides readers with knowledge about all characters, as well as past and future events. The Buffalo and Big Cypress Bayou both contain _________ which are great breeding grounds for small fish and shell fish. The feudal system probably would not have developed if the Roman Empire continued. Why? What type of appeal does Gore mostly use to persuade the audience? if an average silicon atom weighs 28.09 amu, how many silicon atoms are contained in 6.96 x 10^13 amu of silicon? what will 3.16x 10^23 silicon atoms weigh? 3.5 x 10^4 write the following number in standard form (decimal). An atom of which element in the ground state contains electrons in the fourth principal energy level? What is 120.571 in expanded form? A box of icecream bars cost $1.50 after a 25% discount. What was the original price of the box of ice cream bars? what type of cell is a stomach cell my uncle who lives in Detroit is elderly identify the adjective Explain how a chemist would use the difference method in measuring the mass of a liquid What kind of cell in the human body do you think would have more mitochondria a muscle cell or skin cell? Explain your answer. In what way did the 1842 expedition of johnc. frmont contribute to westward migration? Which is the BEST description of the purpose and motivation of groups like the Ku Klux Klan and the White League during the Reconstruction era? A)Groups like the Ku Klux Klan and the White League worked to help the newly freed slaves adjust to life after slavery. B)Groups like the Ku Klux Klan and the White League worked to provide financial assistance for retired Confederate veterans and their families. C)Groups like the Ku Klux Klan and the White League worked to restore white supremacy in the South through threats and violence against free blacks and white Republicans. D)Groups like the Ku Klux Klan and the White League worked to ensure that white southerners cooperated with the Reconstruction policies put into effect by the federal government. Steam Workshop Downloader