1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
9

Consider the unsigned decimal number 35. What is the value in hexadecimal? 3510 = _______ 16

Computers and Technology
1 answer:
Lena [83]3 years ago
4 0

Answer:

(35_{10}) = (23)_{16}

Explanation:

The Hexa-decimal numbers have base 16 and includes numbers:

0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F

The given steps are performed to convert a decimal number to hexa-decimal number, here to convert decimal number 35 to hexa-decimal number:

  • Divide 35 by 16
  • Note the remainder, r which is 3 here and quotient which is 2
  • Again divide 2 (quotient) by 16 and note the remainder, r' which is 2 and quotient is 0
  • We will stop here as the quotient is now 0. Usually division by 16 is repeated until we get quotient = 0
  • Now arrange the remainder in reverse order to get the hexa-decimal number as r'r
  • The hexa-decimal number is (23)_{16}
You might be interested in
Identify two areas of science or technology that make your life easier, safer, or otherwise better than your grandparents lives
vladimir2022 [97]
Heres some:

Quantum computing
Machine Learning
Medicine
Aeronautical Engineering (Drones, better transportation)
8 0
3 years ago
Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles
natulia [17]

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

6 0
3 years ago
A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file
AleksAgata [21]

Answer:

The answer is "Data"

Explanation:

A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization

At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.

3 0
3 years ago
_____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
kaheart [24]

Answer:

Software

Explanation:

6 0
3 years ago
Countdown until matching digits Write a program that takes in an integer in the range 11-100 as input. The output is a countdown
Dovator [93]

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   int n;

   scanf("%d", &n);

   if(n<11 || n>100){

       printf("Input must be between 11 - 100");    }

   else{

       while(n%11 != 0){

           printf("%d ", n);

           n--;        }

       printf("%d ", n);    }

   return 0;

}

Explanation:

The existing template can not be used. So, I design the program from scratch.

This declares the number n, as integer

   int n;

This gets input for n

   scanf("%d", &n);

This checks if input is within range (11 - 100, inclusive)

   if(n<11 || n>100){

The following prompt is printed if the number is out of range

       printf("Input must be between 11 - 100");    }

   else{

If input is within range, the countdown is printed

       while(n%11 != 0){ ----This checks if the digits are identical using modulus 11

Print the digit

           printf("%d ", n);

Decrement by 1

           n--;        }

This prints the last expected output

       printf("%d ", n);    }

4 0
3 years ago
Other questions:
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Which is a feature of a strong thesis statement? A) It presents only the facts. B) It is open-ended. C) It answers the central q
    15·1 answer
  • When a linke chain contain nodes that reference both the next node and the previous node it is called a(n)
    6·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • A systems analyst draws a lifeline with an X at the end. This lifeline represents _____.a. a message that cannot be deliveredb.
    9·2 answers
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • When creating a documentary, what is not an appropriate source for footage?
    11·1 answer
  • How many invalid code sequences can we have in 5b/6b encoding?
    15·1 answer
  • What is an OS? Explain the objectives of an OS.​
    11·1 answer
  • Help help help help help help
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!