Why would you convert your birth year to binary numbers?

Answers

Answer 1

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!


Related Questions

The flowchart that show the sequence of logical operations executed by a computer is called a: A. Systems flowchart B. Operations flowchart C. Program flowchart D. Decision flowchart

Answers

Answer:

It is called a Program Flowchart.

Explanation:

Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his computer and help it function properly?

Answers

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

Answer:

Utility software

Explanation:

When did the silent movie era end?
A.1919
B.1929
C.1939
D.1949

Answers

Answer:

The answer is 1929.

Pretty sure your answer is B. 1929

It is implied in the AMS Climate Paradigm that components of Earth’s climate system (e.g., atmosphere, hydrosphere, cryosphere, geosphere, and biosphere) interact in a(n) ________ way as described by natural laws.

Answers

Answer:

orderly

Explanation:

The American Meteorological Society presents information, development, and an interdisciplinary approach towards the researches of atmosphere and hydrosphere. The goal of the society is intended towards developing a research-based idea covering the topics of atmosphere and science. The atmosphere, hydrosphere, cryosphere, geosphere, and biosphere are the components of the environment that helps in determining and analyzing the climatic condition of the Earth.

Question 2 and 3 answer

Answers

Answer:

3=if you want to highlight text, move a cursor to the start of the line,hold the shift key, and then press a down arrow

Joe's computer crashed and I was looking for a replacement which of the following criteria is less important.Ram,money, color, usage ​

Answers

Answer:

color

Explanation: nobody cares what color it is how it works

Colour is the less criteria as Joe's computer crashed, and he was looking for a replacement. Hence, option C is correct.

What is meant by computer crashed?

A computer crash occurs when an operating system or program stops functioning properly. When: Hardware has had an irreparable failure.

Computer crashes are the result of hardware or operating system errors. Even though software errors are unquestionably more common, hardware errors can still be quite harmful and are more difficult to spot. A computer cannot function if certain hardware components are malfunctioning.

A crash or system crash occurs when a computer program, such as an operating system or software application, stops functioning properly and exits. A computer cannot operate without a number of hardware parts working properly.

Thus, option C is correct.

For more details about  computer crashed, click here:

https://brainly.com/question/4701800

#SPJ2

Can you get accurate
information from social
media?
A. Sometimes
B. Usually
C. Always
D. Nevali

Answers

Answer:

The answer is B.usually

Explanation:

We usually get accurate information from social media cause sometime they also tell us the fake news...

Yes, it is possible to get accurate information from social media "sometimes" (Option A)

How accurate is the information gotten from social media?

The accuracy of information obtained from social media can vary widely.

While social media platforms can be a valuable source of news, updates, and insights, the information shared is often user-generated and may not always be verified or fact-checked.

Therefore, the accuracy of information on social media is not guaranteed, and it is essential to cross-reference and verify information from reliable sources before considering it as entirely accurate.

Critical evaluation and discernment are crucial when using social media as an information source.

Thus, Option A is the right answer.

Learn more about social media at:

https://brainly.com/question/1163631

#SPJ6

By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. A) identity thieves B) keyloggers C) hackers D) cyberstalkers

Answers

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

What is output?
C = 1
sum 0
while (c < 10):
c = c + 3
sum
sum + C
print (sum)

Answers

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Answers

Answer:

extranet

Explanation:

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

The contains the computer's "brain," the central processing unit (CPU).

Answers

Answer:

Inside the computer case, on the motherboard. Hope this helps!

Explanation:

On a webpage, a _____ provides supplemental material such as social networking feeds and ads. Group of answer choices footer sidebar header navigation bar

Answers

Answer:

sidebar

Explanation:

The part of the webpage that is being described in this question is known as a sidebar. These are the far left/right sides of the webpage and are usually used for networking feeds, ads, related information, major points of the main page, biographical info, as well as persuasive information. This section of the webpage serves two main purposes to provide the viewer with advertisements and to encourage the reader to read the more detailed main article.

Different types of names given to explicit convertion in java

Answers

Answer:

Different types of name given to explicit conversation in java are

1. Automatic

2. Explicit

Can anyone help me
I will make you a brainalist

Answers

Answer:

Explanation:

Exercise A:

1. A table.

2. Categorical.

3. Access.

4.Queries.

5.ACCDB extension.

Exercise B:

1. Insert Tab.

2. DoCmd.Quit method.

3.Navigation Pane.

4. Modify table data.

5.The top pane and the bottom pane.

Hope this helped you!

Two fingers are assigned to six letters each. What fingers are they?

Answers

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.
makeOutWord("<<>>", "Yay") → "<>"
makeOutWord("<<>>", "WooHoo") → "<>"
makeOutWord("[[]]", "word") → "[[word]]"

Answers

Answer:

The following are the answer to this question.

Explanation:

In the given code, a "makeOutWord and word" is already used to hold some value. In this code, we define a string method "makeOutWord" that accepts two string variables "out and the word" in its parameter.

Inside the method, a return keyword is used that uses the string variable "out and the word" with the "substring" method, this method is used to returns a new string from an old string value, and it also uses the "word" string variable for the return value.  

please find the attached file for code:

If something is copyrighted,
how can it be used?
A. Only with credit
B. Only with permission
C. With credit or in certain "fair use" cases
D. With permission or in certain
air use" cases

Answers

D
Because you need permission

Match the following
image editing software
Web browsers
Computer Aided Design, or the use of software to aid in
1,
technical drawings and models
2. Information processed or stored by the computer
3. software that organizes a collection of data
also known as graphics software, this software enables a
4.
person to change or create visual images on a computer
fields on a screen used to search for specific information in a
5.
database
CAD
query
Web page
dota
6. Software used to browse the World Wide Web
a page on the World Wide Web that may contain text,
7
Images, audio, or video
database

Answers

Answer:

4

Explanation:

because your wanting something that's well edit an image

adding transition slides to a presentation

Answers

Answer:

1. Select the slide you want to add a transition to.

2. Select the Transitions tab and choose a transition. Select a transition to see a preview.

3. Select Preview to see what the transition looks like.

To remove a transition, select Transitions > None.

Which of the following is not a method for opening Word software? right clicking on the desktop and selecting "view" selecting the Start button and navigating through all programs selecting the Start button and navigating to the most recently used programs using an icon on the desktop

Answers

Answer:

right clicking on the desktop and selecting "view"

Explanation:

A word software enables us to create, edit  two or more documents at the same time and print documents, to write text, store it electronically, display it on a screen and modify it by entering commands, and then print it.

It enables you to draw graphs, and possibly even convert videos into a document.

Word software cannot be opened by right-clicking on the desktop and selecting "view".

Answer:

right clicking on the desktop and selecting "view" selecting the Start button

Explanation:

Word pad is a word processing software included with all versions of MS- Windows starting from Windows 95 to Windows 10. It is more better compared to Notepad and much simpler than Microsoft Word. Microsoft replaced the Microsoft write.

You cannot access word pad by clicking on the desktop and selecting "view", the simplest way to access Word pad is by clicking on the start button and then clicking on the word pad.

​ In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system.

Answers

Answer:

Systems analysis phase.

Explanation:

In a systems development life cycle (SDLC) model, the purpose of the systems analysis phase is to build a logical model of the new system.

In the systems analysis phase, the system developer examines or analyzes the information or data about the requirements of an end-user, which are then implemented to achieve the organizational set goals and objectives.

Hence, systems analysis refers to the process of gathering data or factual informations, understanding processes, problem identification and suggestions of probable solutions for an effective and efficient functioning of the system.

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

where can I watch all harry potter movies for free?
and I know this isn’t exactly the question I should be asking here but pls help me and don’t give me virus

Answers

Answer:

Ive streamed them before on DailyMotion

The questions are from HTML. State whether the following statements are true or false. 1. HTML is the programming language. 2. Web page is the collection of website. 3. <marquee> tag is used to link the Hyper text. 4. Heading tag supports different levels from H1 to H6. 5. Attributes provide additional information to the HTML tags. 6. Empty tags must be closed with ending tag </>. ​

Answers

Answer:

true

Explanation:

hope this helps

Using the drop-down menus, correctly match the name of the person with the computer-programming
innovation
In 1975,
founded Microsoft, which released Altair BASIC, the first
programming language for personal computers.
found the first computer bug in 1947, and invented the concept of a compiler in
1952
v led a team at IBM that developed FORTRAN and its compiler in 1957
developed C++ programming language, and published the reference guide
in 1987
released the Python programming language.

Answers

Answer:

1. Bill Gates and Paul Allen

2. Grace Murray Hopper

3. John Backus

4. Bjarne Stroustrup

5. Guido van Rossum

evolution of new technology also increased the crime in our society explain​

Answers

Answer:

yes ,for sure evolution of new technologies also increased the crime in our society. Many cyber crime are occurring due to the use of new technologies. People can hack the data , transfer money from others account and so on . People are using new technology to harm others ,steal others data and information . It has given an opportunity to many people to do various crime easily .

Programming environment is

Answers

Answer:

environments containing language specific editors and source level debugging facilities or all of the hardware and software in the environment used by the programmer.

Explanation:

quick google search.

How long are objective tests for FBLA-PBL events? Apex

Answers

Answer:

You will have 60 minutes to complete all objective tests. Each test has 100 multiple choice questions.

Explanation:

60 minutes to complete the objective test

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *
10 points
Application software
System software
Open-source software
Proprietary software

Answers

Answer:

Open Source software.

Answer:

open source software

Explanation:

Nina's grades could be better. She gets about five hours of sleep every weeknight and ten hours per night on weekends. How much sleep should she get to better concentrate on schoolwork? Five to six hours every night nine to ten hours every night a total of forty hours a week a minimum of eighty hours a week

Answers

Answer:

B. Nine to ten hours every night

Explanation:

You need to have at least 8 hours of sleep and B makes the most sense cause then she gets enough sleep and enough time to study.

Answer:

9 to ten hour

Explanation:

Other Questions
S que conoces a mi hermano Change all verbs to imperfect form The temperature went from -16F to 7F. What was the change in temperature? A: -9F B: -23F C: 9F D: 23F Add.(2x2 - 2x) + (6x 4) In organizational culture, people focus refers to _____. a. the degree to which the organization monitors and responds to changes in the external environment b. the degree to which management s decisions take into account the effect of outcomes on employees within the organization c. the degree to which rules, policies, and direct supervision are used to oversee and control employee behavior d. the degree to which employees are encouraged to be aggressive, innovative, and risk seeking What is the slope of a line that passes through 41-50 Solve the equation,m + 55 +1 = m= 2. I sit and read under the tree.Write each simple predicate then underline the complete predicate if the sentiment contains compound predicate write compound What am I asking you to write and think about this semester? What is an example of something you might choose to focus on? In addition to your answer, please state where you found help on the website for this question.Your answer __________ is a growing tool for managers to enhance communication and collaboration in support of empowered or bossless work environments. 15. The Earth is acted upon by the gravitatof attraction due to the Sun. Then why does theEarth not fall towards the Sun? Point K is on line segment JL. Given JK = 5x + 7, JL = 2x+8, and KL = 4,determine the numerical length of JL. 4(-32x+5)-(-33x-26)= What were the main goals of Hernando de Soto's expedition? Check all that apply.O to claim lands for SpainO to find a new route to AsiaO to find places to build settlementsto find goods to send back to SpainO to mine for gold and other treasureO to improve relationships with American Indians Which one of the organic molecules listed below has more energy stored in its bonds. Proteins Carbohydrates Lipids Nucleic Acids The Dust Bowl During the 1930s, extreme drought and high winds made life incredibly difficult in the Great Plains region of the United States. In many areas, rainfall was forty percent less than normal. The soil became extremely dry, and when strong winds blew, they created tremendous dust storms. These so-called black blizzards were so thick that they made daylight seem like dusk. During this terrible period, the Great Plains region of the United States was named the Dust Bowl. Over the next few years, the drought continued, and the winds created more dust storms. In some places, the drought and high winds lasted for eight years. Many people wondered if the black blizzards would ever end. What role does the underlined sentence serve in this paragraph?The underlined part is..... These so-called black blizzards were so thick that they made daylight seem like dusk. A: It is a fact that serves as a supporting detail. B: It is an example that serves as a supporting detail. C: It is a statistic that serves as a supporting detail. D: It is the topic sentence. I always thought that my step dad never loved me enough or anything but it turns out he had a serious medical condition, its called being a j e r k. i need a little help with this equation 15-5+5^2 what is a government supposed to do for its people? What are the different ways in which early settlers in the English colonies developed new and unique forms of government? Which city is located at 15"S, 28"E?