1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
7

Compute (110110001.01)2 + (27.12)10 + (121.25)16 – (130.20)16 and display the answer in hexadecimal base.

Computers and Technology
1 answer:
mel-nik [20]3 years ago
8 0

Answer:

(110110001.01)₂ + (27.12)₁₀ + (121.25)₁₆ – (130.20)₁₆ = (445.38953125)₁₀ = (1BD.63B851EB851EB851EB85)₁₆

Explanation:

(110110001.01)₂ + (27.12)₁₀ + (121.25)₁₆ – (130.20)₁₆

leaving the answer in hexadecimal

To solve this, we first convert all the numbers to base 10, solve, then convert back to hexadecimal

(110110001.01)₂ = (1×2⁸) + (1×2⁷) + (0×2⁶) + (1×2⁵) + (1×2⁴) + (0×2³) + (0×2²) + (0×2¹) + (1×2⁰) + (0×2⁻¹) + (1×2⁻²) = (433.25)₁₀

(27.12)₁₀ = (27.12)₁₀

(121.25)₁₆ = (1×16²) + (2×16¹) + (1×16⁰) + (2×16⁻¹) + (5×16⁻²) = (289.14453125)₁₀

(130.20)₁₆ = (1×16²) + (3×16¹) + (0×16⁰) + (2×16⁻¹) + (0×16⁻²) = (304.125)₁₀

(110110001.01)₂ + (27.12)₁₀ + (121.25)₁₆ – (130.20)₁₆

= (433.25)₁₀ + (27.12)₁₀ + (289.14453125)₁₀ - (304.125)₁₀

= (445.38953125)₁₀

We then convert (445.38953125)₁₀ back to hexadecimal

(445.38953125)₁₀ = (1BD.63B851EB851EB851EB85)₁₆

16 | 445 | R

16 | 27 | 13 = D

16 | 1 | 11 = B

16 | 0 | 1 = 1

Read upwards, 1BD

Hope this Helps!!!

You might be interested in
PlanthelogicforLungi’sapplicationusingpseudocode.Thelogicneedstosatisfythefollowingneeds:TheapplicationwillneedtoallowLungitoen
anastassius [24]
According to my
calculations is 3
6 0
1 year ago
Question 3
goldfiish [28.3K]

Answer: Zero is output.

8 0
3 years ago
Choose the false statement below. The content that displays in the browser is contained in the head section. The content that di
aivan3 [116]

Answer:

The content that displays in the browser is contained in the head section.

Explanation:

The content that displays in the browser is contained in the head section, this is the false statement because the The HTML head is the contents of the <head> element.

The head's content is not displayed on the page. Instead, the head's job is to contain metadata about the document.

3 0
3 years ago
The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
Advocard [28]

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

8 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
Other questions:
  • If you’d like to have multiple italicized words in your document, how would you change the font of each of these words?
    7·2 answers
  • Does toontown rewritten carry spyware or malware
    9·1 answer
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • To add text to a blank slide layout, _____.
    8·2 answers
  • What is the difference between an embedded image and an attached image
    7·2 answers
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • Write a game that plays many rounds of Rock Paper Scissors. The user and computer will each choose between three items: rock (de
    8·1 answer
  • Which view would you need to use to make
    14·1 answer
  • If you misspell a word in your Java program it may be true that I. the program will not compile II. the program may compile, but
    6·1 answer
  • Your worksheet contains a price in cell A5 and many formulas refer to that price how would you refer to that price in the formul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!