1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
2 years ago
9

Express the following binary numbers in hexadecimal. (a) %100011100101 (b) %1011001111 (show work)

Computers and Technology
1 answer:
Lapatulllka [165]2 years ago
7 0

Answer:

(100011100101)_{2} = (8E5)_{16} = %8E5

(1011001111) = (2CF)_{16} = %2CF

Explanation:

Binary and hexadecimal values have the following pair equivalences.

(0000)_{2} = (0)_{16}

(0001)_{2} = (1)_{16}

(0010)_{2} = (2)_{16}

(0011)_{2} = (3)_{16}

(0100)_{2} = (4)_{16}

(0101)_{2} = (5)_{16}

(0110)_{2} = (6)_{16}

(0111)_{2} = (7)_{16}

(1000)_{2} = (8)_{16}

(1001)_{2} = (9)_{16}

(1010)_{2} = (A)_{16}

(1011)_{2} = (B)_{16}

(1100)_{2} = (C)_{16}

(1101)_{2} = (D)_{16}

(1110)_{2} = (E)_{16}

(1111)_{2} = (F)_{16}

We convert from binary to hexadecimal selecting groups of 4 binary from the binary code, from the least significant bits(at the right) to the most significant bits(at the left). The conversion is an hexadecimal "string" from the last group you converted to the first. So:

(a) %100011100101

(0101)_{2} = (5)_{16}

(1110)_{2} = (E)_{16}

(1000)_{2} = (8)_{16}

So

(100011100101)_{2} = (8E5)_{16}

(b) %1011001111

(1111)_{2} = F_{16}

(1100)_{2} = C_{16}

(10)_{2} = (0010)_{2} = 2_{16}

(1011001111) = (2CF)_{16}

You might be interested in
What is the difference between a surge and a spike?
Anna [14]
D, I think. I may be wrong. Someone comment and tell me
3 0
3 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
Based on the unit content and your own ideas, how would you define a video game in your own words? What separates a regular vide
lara31 [8.8K]

Answer:

A video game would be a series of steps to produce or outcome / end in the form of controller a character or the how the game can be played and being able to play it at some level, but a good game would have multiple questions and a hard difficulty maybe even a customizable section for your character or object. In other words a Video game would be a series of steps to produce a outcome from controlling a character and a Good video game would be the same but added a level of difficulty and harder mechanics into the game.

Explanation:

Hope this helped :)

3 0
3 years ago
Consider a classful IPv4 address 200.200.200.200? What is its implied subnet mask? If we take the same address and append the CI
topjm [15]

Answer:

a. 255.255.255.0 (class C)

b. 255.255.255.224

Explanation:

Here, we want to give the implied subnet mask of the given classful IPV4 address

We proceed as follows;

Given IPv4 address: 200.200.200.200

Classes

Class A : 0.0.0.0 to 127.255.255.255

Class B: 128.0.0.0 to 191.255.255.255

Class C: 192.0.0.0 to 223.255.255.255

Class D: 224.0.0.0 to 239.255.255.255

so 200.200.200.200 belongs to Class C and it's subnet mask is 255.255.255.0

In CIDR(Classless Inter Domain Routing)

subnet /27 bits means 27 1s and 5 0s. so subnet

i.e 11111111.11111111.11111111.11100000 which in dotted decimal format is 255.255.255.224 .

4 0
3 years ago
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • Prominent is another word for stands out. True False
    13·1 answer
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • Modify the program so the output is: Annual pay is 40000 Note: Whitespace (blank spaces / blank lines) matters; make sure your w
    9·1 answer
  • The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of betwee
    8·1 answer
  • In a meeting, Juan hears someone say a product mix is "wide." What does
    13·1 answer
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • Which command could you use to change to the /usr directory using a relative pathname?
    8·1 answer
  • Being a part of an organization or giving back to the community is which rewards of work factor?
    6·1 answer
  • Why is computer economics important?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!