1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
14

What is hexadecimal number system​

Computers and Technology
1 answer:
eduard3 years ago
6 0

Our usual number system is the decimal number system. As the name suggests, it uses base 10.

Using a certain base to express numbers means to write numbers as weighted sums of powers of the base. For example, in base 10 we write

1437 = 1\cdot 10^3 + 4\cdot 10^2 + 3\cdot 10^1 + 7\cdot 10^0

So, the weights of the powers are what we call the digits of the number.

Note that our digits finish at 9 because it wouldn't make sense to have a digit to express 10: if we choose a weight of 10 (or more) for a certain power, we can simply scale it to the next one: for example, saying "ten hundreds" is the same as saying "one thousand":

10\cdot 10^2 = 1\cdot 10^3

Now, the hexadecimal number system simply uses 16 as base, instead of 10. This means that its digits are

1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

where digits from A to F represent numbers from 10 to 15.

These are some examples of hexadecimal numbers turned into our usual system:

(47B)_{16} = 4\cdot 16^2+7\cdot 16^1+11\cdot 16^0 = 1024+112+11=(1147)_{10}

(CAF35)_{16} = 12\cdot 16^4+10\cdot 16^3+15\cdot 16^2+3\cdot 16^1+5\cdot 16^0 = 786432+40960+3840+48+5=(831285)_{10}

You might be interested in
All of the following items could be too expensive for someone with only a high school degree to afford except
Papessa [141]
This sounds like a multiple choice answer can I have 4 choices to pick?
7 0
3 years ago
Which of the following are safety guidelines when socializing online?
DochEvi [55]

Answer:

All of them execpt five and three.

Explanation:

It is okay to have social media and receive messages.

3 0
2 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
What are building blocks? select three options.
mr Goodwill [35]

Answer:

Content that has been formatted

Content that is stored as templates

Content that is stored in galleries

Explanation:

These are the answers because that’s just what they are

7 0
4 years ago
EdHesive 3.7 Code Practice?
devlian [24]

Answer:

if 3 + 3 == 6:

 print("Hey 3 and 3 is 6")

 if 5 + 3 == 8:

   print("You are not going to catch me")

   if 5 + 6 == 10:

     print("****nag*****")

   else:

     print("You thought like 5 + 6 = 11 ")  

     if 6 + 6 == 12:

       print("Great! This one is correct")

       if 5 + 7 == 12:

         print("Great, this is correct as well")

         if 3 + 3 == 4 and 5 + 5 == 10:

           print("Great! Congrats")

Explanation:

Please check the answer, and practice if else and various other ladders as much as you can.

8 0
4 years ago
Other questions:
  • A computer with a domain name is called a
    8·2 answers
  • Open and close ____ immediately following the name of a procedure identify a Visual Basic statement as a procedure call statemen
    6·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • What does gps stand for ?
    15·2 answers
  • The statement cout << sales[0,3] + sales[1,3]; will __________. Use the following array named sales to answer this questio
    14·1 answer
  • What is the key function of a sales team?
    13·1 answer
  • When creating a documentary, what is not an appropriate source for footage?
    11·1 answer
  • Samira recently opened an online potted plant store and needs to promote it. She chose Google Ads because it offers advertisers
    12·2 answers
  • For which of the following values of A and B will the expression A || B be true?
    15·1 answer
  • What is a fundamental difference between the SAP platform and the AirBnB platform?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!