1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
2 years ago
14

What is hexadecimal number system​

Computers and Technology
1 answer:
eduard2 years ago
6 0

Our usual number system is the decimal number system. As the name suggests, it uses base 10.

Using a certain base to express numbers means to write numbers as weighted sums of powers of the base. For example, in base 10 we write

1437 = 1\cdot 10^3 + 4\cdot 10^2 + 3\cdot 10^1 + 7\cdot 10^0

So, the weights of the powers are what we call the digits of the number.

Note that our digits finish at 9 because it wouldn't make sense to have a digit to express 10: if we choose a weight of 10 (or more) for a certain power, we can simply scale it to the next one: for example, saying "ten hundreds" is the same as saying "one thousand":

10\cdot 10^2 = 1\cdot 10^3

Now, the hexadecimal number system simply uses 16 as base, instead of 10. This means that its digits are

1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

where digits from A to F represent numbers from 10 to 15.

These are some examples of hexadecimal numbers turned into our usual system:

(47B)_{16} = 4\cdot 16^2+7\cdot 16^1+11\cdot 16^0 = 1024+112+11=(1147)_{10}

(CAF35)_{16} = 12\cdot 16^4+10\cdot 16^3+15\cdot 16^2+3\cdot 16^1+5\cdot 16^0 = 786432+40960+3840+48+5=(831285)_{10}

You might be interested in
The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext
Bad White [126]
The answer is decryption
8 0
2 years ago
A computer supply company is located in a building with three wireless networks.
Sonja [21]

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

3 0
3 years ago
Advantages of a personal area network
Ratling [72]
The main advantage is the security, the pan is a personal network of one or two person so there is no risk of any leak of data, best way to share resources each other via bluetooth

4 0
3 years ago
How many digits are in the binary number system? Explain why.
Katen [24]

Answer:

Since there are only two digits in binary, there are only two possible outcomes of each partial multiplication: If the digit in B is 0, the partial product is also 0. If the digit in B is 1, the partial product is equal to A.

Explanation:

8 0
2 years ago
Read 2 more answers
Seven Features of computer aids design software
astra-53 [7]
Computer-aided engineering (CAE) and finite element analysis (FEA) Computer-aided manufacturing (CAM) including instructions to computer numerical control (CNC) machines. Photorealistic rendering and motion simulation. Document management and revision control using product data management (PDM).
3 0
2 years ago
Other questions:
  • Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​
    14·1 answer
  • 18 Select the correct answer.
    5·1 answer
  • How do you read a column
    8·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    11·1 answer
  • Please answer this correctly what’s the answer opening modify style dialog box enables you to
    8·1 answer
  • When was the federal commission act put into effect?????
    13·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • Why does brainly want me to PAY or watch ads<br> i hate doing that
    9·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!