1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
9

Consider the unsigned decimal number 35. What is the value in hexadecimal? 3510 = _______ 16

Computers and Technology
1 answer:
Lena [83]3 years ago
4 0

Answer:

(35_{10}) = (23)_{16}

Explanation:

The Hexa-decimal numbers have base 16 and includes numbers:

0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F

The given steps are performed to convert a decimal number to hexa-decimal number, here to convert decimal number 35 to hexa-decimal number:

  • Divide 35 by 16
  • Note the remainder, r which is 3 here and quotient which is 2
  • Again divide 2 (quotient) by 16 and note the remainder, r' which is 2 and quotient is 0
  • We will stop here as the quotient is now 0. Usually division by 16 is repeated until we get quotient = 0
  • Now arrange the remainder in reverse order to get the hexa-decimal number as r'r
  • The hexa-decimal number is (23)_{16}
You might be interested in
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
What type of database contains multiple collections of data that are related to one another cells
statuscvo [17]
The different types<span> of </span>databases<span> include operational </span>databases<span>, end-user </span>databases<span>, distributed </span>databases<span>, analytical </span>databases<span>, relational </span>databases<span>, hierarchical </span>databases<span> and </span>database<span> models. 

Source Bing</span>
7 0
3 years ago
Select the correct answer.
Shtirlitz [24]

Answer:

The right answer is text. we just need to just mention the date inside the text, and also mention the cell number, where you want that to be printed. The formula is Text(B1, "MM-DD-YY").

The other mentioned are a detailed information, and contains a mixed blend of information. The table, chart, flowchart and the shapes contains different data type. However, text is a data type, and date can be converted into text date type through the above formula. Hence, we are converting the date data type to text data type.

Explanation:

The answer is self explanatory.

6 0
3 years ago
A file that is embedded on the hard drive of a computer, often without a person's knowledge, that collects and stores informatio
Gnom [1K]
The correct answer would be Spyware
6 0
3 years ago
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use
AnnyKZ [126]

Answer:

He can do a presentation in MS Powerpoint, or similar software. In this way, he can display information in the form of a slide show and communicate clearly and directly his ideas to his partners at the board meeting, so that, his new design is approved.

7 0
3 years ago
Other questions:
  • Nolan has just created a linked cell to another cell in a separate worksheet in his current Excel 2016 workbook.
    10·2 answers
  • _______ are unprocessed facts that a computer feeds on.
    5·1 answer
  • What program is considered the industry standard for digital graphics and image editing?
    7·2 answers
  • For each of the following data storage needs, describe which abstract data types you would suggest using. Natural choices would
    15·1 answer
  • ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
    12·1 answer
  • If a device does not require a driver, it is _____.
    6·1 answer
  • The large program that controls how the CPU communicates with other components is the​
    9·1 answer
  • Carla needs to list the role for each consultant. Those with four or more years of 26 15 experience take the Lead role. Otherwis
    9·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!