1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
9

Express the following binary numbers in hexadecimal. (a) %100011100101 (b) %1011001111 (show work)

Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
7 0

Answer:

(100011100101)_{2} = (8E5)_{16} = %8E5

(1011001111) = (2CF)_{16} = %2CF

Explanation:

Binary and hexadecimal values have the following pair equivalences.

(0000)_{2} = (0)_{16}

(0001)_{2} = (1)_{16}

(0010)_{2} = (2)_{16}

(0011)_{2} = (3)_{16}

(0100)_{2} = (4)_{16}

(0101)_{2} = (5)_{16}

(0110)_{2} = (6)_{16}

(0111)_{2} = (7)_{16}

(1000)_{2} = (8)_{16}

(1001)_{2} = (9)_{16}

(1010)_{2} = (A)_{16}

(1011)_{2} = (B)_{16}

(1100)_{2} = (C)_{16}

(1101)_{2} = (D)_{16}

(1110)_{2} = (E)_{16}

(1111)_{2} = (F)_{16}

We convert from binary to hexadecimal selecting groups of 4 binary from the binary code, from the least significant bits(at the right) to the most significant bits(at the left). The conversion is an hexadecimal "string" from the last group you converted to the first. So:

(a) %100011100101

(0101)_{2} = (5)_{16}

(1110)_{2} = (E)_{16}

(1000)_{2} = (8)_{16}

So

(100011100101)_{2} = (8E5)_{16}

(b) %1011001111

(1111)_{2} = F_{16}

(1100)_{2} = C_{16}

(10)_{2} = (0010)_{2} = 2_{16}

(1011001111) = (2CF)_{16}

You might be interested in
A___________ is a person who can give information to potential employers about your character and your abilities. Employer emplo
il63 [147K]
I believe the answer is reference.
6 0
4 years ago
[30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
larisa86 [58]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

First, we need to convert these hexadecimal numbers into decimal numbers, then we can easily identify which one is the lowest hexadecimal.

The hexadecimal numbers are F2, 81, 3C, and 39.

F2 = (F2)₁₆ = (15 × 16¹) + (2 × 16⁰) = (242)₁₀

81 = (81)₁₆ = (8 × 16¹) + (1 × 16⁰) = (129)₁₀

3C = (3C)₁₆ = (3 × 16¹) + (12 × 16⁰) = (60)₁₀

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

The 39 is the lowest hexadecimal number among the given numbers.

Because 39 hex is equal to 57 decimal.

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

5 0
3 years ago
A student should always read the directions to a test or question so they know what is expected of them when answering the quest
Kay [80]

I don't know why you needed to ask this but the answer is True

7 0
3 years ago
Read 2 more answers
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
vova2212 [387]

Answer: Client-Server model

Explanation:

The Client-server model is a distributed network application configuration, that partitions task or where one program requests a resource or service from another program, between the providers of a resource or service, called servers, and service requesters called clients. In the client-server architecture, when the client computer sends a request for data to the server through the internet, the server accepts the requested process and deliver the data packets requested back to the client.

4 0
3 years ago
Other questions:
  • Can someone please help me withe these questions its really urgent
    5·1 answer
  • Jorge needs to print out an essay he wrote but he does not have a printer his neighbor has a printer, but her internet connectio
    12·1 answer
  • What 3 types of technologies are used inside hard drives?
    15·1 answer
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • ____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.
    12·1 answer
  • A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi
    7·2 answers
  • 50) Universal Containers has an integration that runs nightly to update the Product (Product2) object in Salesforce with updated
    9·1 answer
  • How does design influence the product's function?
    5·1 answer
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • Which of these is NOT an example of a GUI?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!