1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
4 years ago
12

Convert (123)5 to hexadecimal.

Computers and Technology
1 answer:
KiRa [710]4 years ago
7 0

Answer:

26_{16}

Explanation:

We can obtain the hexadecimal value using an indirected way, first we will convert it to decimal:

(1*5^2+2*5^1+3*5^0)=38_{10}

having the decimal number we have to divide that number multiple times by 16 and get a record of the quotient and reminder, until the quotient is equal to zero.

38| 16

quotient_1=2\\remainder_1=6

2| 16

quotient_2=0\\remainder_2=2

Now we will take the remainders and get the hexadecimal value and put them together. (remember, the hexadecimal number are defined from 0 to F, being A=10, B=11, C=12, D=13, E=14, F=15)

remainder_1=6\\hex_1=6

remainder_2=2\\hex_2=2

The hexadecimal number is 26

You might be interested in
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
Bess [88]

Answer:

Nmap CST CO CT0

Explanation:

Network map (Nmap) is a network scanning and host detection tool used in penetration testing to sorting out vulnerability in a network. Nmap APIs are used in packet sniffer tools as well to scan for available networks. There are different nmap command , but the command needed to scan a port with less noise to evade an IDS is the nmap's "Nmap CST CO CT0" command.

5 0
4 years ago
How do you change a automatic transmission
irinina [24]

Answer:

ohhh ok to all transactions.

6 0
3 years ago
Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
Tresset [83]

Answer:

B. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

Explanation:

6 0
3 years ago
Which feature of vitualization helps increase the IT productivity of a business?
laila [671]
A the answer is yes
7 0
3 years ago
A domain name points to a specific internet address known as a? A. Domain name B. User name C. URL D. IP address
hodyreva [135]
C, URL since the other options aren’t addresses at all
6 0
4 years ago
Other questions:
  • A type of font that has a decorative tail is A.Serif font B. Sans serif font C. Bubbles font D. Reading font
    7·1 answer
  • What is an enterprise system
    14·2 answers
  • Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us
    7·1 answer
  • George writes code for word processing applications. He is looking for a new job opportunity. What position should George look f
    5·2 answers
  • Framing can create which of the following in a photograph? Mystery Saturation Aperture All of the above
    10·2 answers
  • Which VPN topology is also known as a hub-and-spoke configuration?
    15·1 answer
  • Explain what it means to have good file management skills.
    10·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    5·1 answer
  • Your online actions can have real- world consequences. True or false?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!