1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
2 years ago
6

Hexadecimal to denary gcse method

Computers and Technology
1 answer:
Anuta_ua [19.1K]2 years ago
3 0

There are two ways to convert from hexadecimal to denary gcse method. They are:

  • Conversion from hex to denary via binary.
  • The use of base 16 place-value columns.

<h3>How is the conversion done?</h3>

In Conversion from hex to denary via binary:

One has to Separate the hex digits to be able to know or find its equivalent in binary, and then the person will then put them back together.

Example - Find out the denary value of hex value 2D.

It will be:

2 = 0010

D = 1101

Put them them together and then you will have:

00101101

Which is known to be:

0 *128 + 0 * 64 + 1 *32 + 0 * 16 + 1 *8 + 1 *4 + 0 *2 + 1 *1

= 45 in denary form.

Learn more about hexadecimal from

brainly.com/question/11109762

#SPJ1

You might be interested in
When creating an electronic slide presentation, Eliza should ensure that her presentation contains
kondor19780726 [428]

Answer: C) only one main idea on each slide.

Eliza needs to be able to use her electronic slide presentation to convey what the purpose of the presentation is. By providing one main idea on each slide, this would show the audience of Eliza exactly what she wants to convey to them. This would also help her audience get on board of what the whole idea of the presentation is.

8 0
3 years ago
Linda is searching for a new job. Which information would her potential employers likely review in her social profile?
nasty-shy [4]
The answer will be A they would wanna know about her work history
3 0
3 years ago
Read 2 more answers
How can you tell if a motherboard can be watercooled?
ivann1987 [24]
Well your cpu should have a header on it for a pump you can look for close to the cpu it should be little metal rods sticking up where you could connect a fan or a cooling device to!
3 0
3 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Do all careers or professions need computer science? Why or why not?
hjlf

Answer:

Most careers or professions need computer science

Explanation:

As humanity is improving technological wise most jobs will be replaced and other jobs would come into play and in order for individuals to become employed in jobs that will be available in the future to come they will have to have a degree in computer science or know how to operate computers.

8 0
3 years ago
Read 2 more answers
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • Describe network in terms of the class computer lab
    14·1 answer
  • Write a MIPS program to generate the following series of integers: 1, 2, 3. 6, 9, 18. 27, 54. 81. If you are curious where this
    13·1 answer
  • What is most likely kept in as database
    15·1 answer
  • Please help I’ll give you 10 points
    8·2 answers
  • Which of these components is a part of the central processing unit (cpu) of a computer??
    14·1 answer
  • You have created a new DHCP scope with address range 192.168.1.1 to 192.168.1.254. You have five servers configured with static
    8·1 answer
  • Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?
    8·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?
    8·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!