1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
6

Convert the following three hexadecimal numbers to both binary and decimal. (Hint: it is probably easier to convert hex to binar

y first, then convert binary to decimal.) Show your work:
3e 3e0 3e00.
In bullet points, tell what you observe about the relationships among the decimal values of these numbers.
Computers and Technology
1 answer:
Doss [256]3 years ago
6 0

Answer:

3e : 00111110 (62)

3e0 : 0000001111100000 (992)

3e00 : 0011111000000000 (15872)

Explanation:

Converting the given hexadecimal numbers to binary and decimal format:

1) 3e

3-> 0011

e-> 1110

Combining , 3e -> 00111110

This can be converted to decimal by multiplying each 1 in the binary representation by 2^(position -1) and adding the results.

So 3e = 32+16+8+4+2 = 62

2) 3e0

Binary => 0000001111100000

Converting to decimal : 992  [ This is 16 times a]

3) 3e00

Binary => 0011111000000000

Converting to decimal : 15872 [ This is 16 times b]

So adding a 0 to the hex representation multiplies the decimal number by 16.

You might be interested in
Which of the following is true of the 529 plan
sesenic [268]

A 529 Plan is an education savings plan operated by a state or educational institution designed to help families set aside funds for future college costs.

your answer will be: It is a tax-advantaged college savings plan.

5 0
3 years ago
Read 2 more answers
Given a String variable named sentence that has been initialized, write an expression whose value is the number of characters in
Troyanec [42]
Python:

sentence = “this is the sentence.”
size = len(sentence)

C++:

string sentence = “this is the sentence.”
int size = sentence.size()

* Remember strings are just arrays of characters.

5 0
3 years ago
A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her ac
muminat

Answer:d)apprehend and prosecute

Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.

Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he  is pursuing the activity.Thus , the correct option is option(d).

7 0
3 years ago
I need help with the code practice 9.2 Edhesive.<br><br> Thank you
antiseptic1488 [7]

Answer:

you talking about anaconda navigation? i would love to help!

Explanation:

3 0
3 years ago
Read 2 more answers
write a java program that prompts the user to enter scores (each number an integer from 0 to 10) and prints the following output
Vladimir [108]

Answer:

Explanation:

The following is written in Java. It continues asking the user for inputs until they enter a -1. Then it saves all the values into an array and calculates the number of values entered, the highest, and lowest, and prints all the variables to the screen. The code was tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int count = 0;

       int highest, lowest;

       ArrayList<Integer> myArr = new ArrayList<>();

       while (true) {

           System.out.println("Enter a number [0-10] or -1 to exit");

           int num = in.nextInt();

           if (num != -1) {

               if ((num >= 0) && (num <= 10)) {

                   count+= 1;

                   myArr.add(num);

               } else {

                   System.out.println("Wrong Value");

               }

           } else {

               break;

           }

       }

       if (myArr.size() > 3) {

           highest = myArr.get(0);

           lowest = myArr.get(0);

           for (int x: myArr) {

               if (x > highest) {

                   highest = x;

               }

               if (x < lowest) {

                   lowest = x;

               }

           }

           System.out.println("Number of Elements: " + count);

           System.out.println("Highest: " + highest);

           System.out.println("Lowest : " + lowest);

       } else {

           System.out.println("Number of Elements: " + count);

           System.out.println("No Highest or Lowest Elements");

       }

   }

}

4 0
3 years ago
Other questions:
  • Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
    8·1 answer
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? I need the answer ASAP Helping com
    14·2 answers
  • Which osi model layer manages data encryption?
    14·1 answer
  • List two reasons why “buying a computer is no easy task” ?
    12·2 answers
  • What is the purpose of filters in a data base
    11·1 answer
  • The INC and Dec instruction do not effect the__________ flag
    6·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • ______ is a disadvantage of EDI.
    8·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
  • a 2x4 line decoder with enable is implemented using nand gate only. how many nand gate is needed to construct this line decoder?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!