1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
8

(a) Convert to hexadecimal: 1457.1110. Round to two digits past the hexadecimal point.

Computers and Technology
1 answer:
zaharov [31]3 years ago
4 0

Answer:

Following is attached solution to each part. I hope it will help you!

Explanation:

You might be interested in
How do i protect my computer from electrical spikes
Setler [38]
I believe the answer is bloody purple poop that is the size of an extra large grilled cheese 
5 0
4 years ago
Read 2 more answers
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates wh
____ [38]

Answer:

count_land = count_air = count_water = 0

while True:

   s = input("Enter a string: ")

   if s == "xxxxx":

       break

   else:

       if s == "land":

           count_land += 1

       elif s == "air":

           count_air += 1

       elif s == "water":

           count_water += 1

print("land: " + str(count_land))

print("air: " + str(count_air))

print("water: " + str(count_water))

Explanation:

*The code is in Python

Initialize the variables

Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1

When the loop is done, print the number of strings entered in the required format

4 0
3 years ago
What is local technology ? give examples​
8090 [49]

Answer:

the technologynwhich is used in our locality os calleg local technology

ex. biogas farm , modern methods of 1transport etc

7 0
3 years ago
Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through meth
yuradex [85]
<span>Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through methods. This practice is known as.. 
</span><span>c. encapsulation.  It </span><span>is a mechanism of bundling the data (variables) and code acting on the data (methods) together as one.</span>
7 0
3 years ago
What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly
IRINA_888 [86]

Answer:

D,A,B hope this is it!!!!!

7 0
3 years ago
Read 2 more answers
Other questions:
  • Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what ha
    10·1 answer
  • Select the correct answer.
    7·2 answers
  • We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
    8·1 answer
  • Network signaling is a function of which layer of the osi model
    10·1 answer
  • 50 Points being offered for the fastest and most correct response<br><br> How do I fix this?
    6·2 answers
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Who is the fan of Techno gamerz and Total gaming
    10·1 answer
  • Part 1 of 4 parts for this set of problems: Given an 4777 byte IP datagram (including IP header and IP data, no options) which i
    9·1 answer
  • 1a. Ust Seven (7) Components of a Computer?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!