1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
12

Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111

010110001.0112 (b) 10110011101.112
Computers and Technology
1 answer:
melomori [17]3 years ago
3 0

The given decimal values are converted to octal and hexadecimal.

Explanation:

a. The converted octal value of 111010110001.0112 decimal number is  1473055755061.00557000643334272616

The converted hexadecimal value of 111010110001.0112 decimal number is  19D8B7DA31.02DE00D1B71758E21965

b. The converted octal value of 10110011101.112 decimal number is  113246503335.07126010142233513615

The converted hexadecimal value of  10110011101.112 decimal number is  

25A9A86DD.1CAC083126E978D4FDF4

a. while converting back from octal to decimal the value is 111010110001.01119999999999999989

b. while converting back from octal to decimal the value is

10110011101.11199999999999999973

Hence both the values changes while we convert from octal to decimal.

You might be interested in
Cable Internet access can be described with which feature?
Alekssandra [29.7K]

Answer:

what issue do you think are important in our life

7 0
3 years ago
Read 2 more answers
What is LINUX?
valkas [14]

Answer:

The answer is A

Explanation:

I know what it is.

4 0
3 years ago
Read 2 more answers
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
What is the advantage of using the Publish Online option for sharing a calendar? It creates a web version that can be viewed by
kotykmax [81]

Answer:

its D. it allows a user outside an organization to view the calendar.

Explanation:

i just got it right on edge 2020.

7 0
3 years ago
Read 2 more answers
__________ BI apps use real-time or near real-time data in order to support line managers who need to monitor performance of his
ruslelena [56]

Answer: Operational BI(Business Intelligence)

Explanation:Operational business intelligence is the tool that works on the organizational performance through evaluation and testing by analyzing the business process and data.It is rapid responding tool for the changing business pattern and demands.

Strategical, tactical and traditional business intelligence tool don't provide the evaluation of the business performance in the accordance with business trends rather having strategical approach, planned approach and traditional approach respectively.

Thus, the correct option is option(b).

8 0
3 years ago
Other questions:
  • The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
    8·1 answer
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • If you want to emphasize the Greek root of a word in a document, which tool in Microsoft® Word could you use?
    6·2 answers
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • This is in government
    15·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • Ranboo back story? (not homework i just wanna find some ppl who are interested in the same things) ft. the reddie meme
    9·2 answers
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!