1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
7

Convert (65.125)10 to octal.

Computers and Technology
1 answer:
grigory [225]3 years ago
5 0

Answer:

101.1

Explanation:

Keep in mind that octal has 8 numbers

Step 1: Split your number in 2 parts (integer part and decimal part):

  • integer part 65
  • decimal part 0.125

Step 2: Convert the decimal part. For this step you need to multiply your decimal part and 8 (8 correspond the octal base) and get the integer part until you need it:

      0.125 * 8 =  1

So your decimal part correspond to number 1 in octal = (1)8

Step 3: Convert integer part: for this step you need to divide your integer part by 8 until you can and get the remainder

      65 / 8 = 8 remainder 1

        8 / 8 = 1 remainder 0

         1 / 8 = 0 remainder 1

Step 4: join the remainders from bottom to top and get the integer part

            101

Step 5: join the integer part and the decimal part to get the octal convertion

              101.1

You might be interested in
What are copyright laws? Authority to reprint an original work as long as it's not for profit Entitlement to use and sell anothe
Anastaziya [24]
I think it's the lest one: Rights given to original authors and creators to protect their work from unlawful use
5 0
3 years ago
Read 2 more answers
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time
olga_2 [115]

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

5 0
2 years ago
Select the correct answer.
WINSTONCH [101]

i think its B) Theme

7 0
3 years ago
The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
Vlad1618 [11]

Incomplete question. However, I answered from a general IT perspective.

<u>Explanation:</u>

It is important to note that the internet |(or real internet) in this case, refers to a global network of interconnected networks (internetworks) linked together for the purpose of communication. In other words, it is a broad global network arranged in a mesh network topography form.

It is also important to <em>remember </em>that nobody owns the internet, in other words, it is open an source network. So some internet service providers (ISPs) have a business model where they make revenue by having users pay in other to have the internet service delivered to them.

6 0
3 years ago
Other questions:
  • Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?
    5·2 answers
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • _____ are special combinations of keys that tell a computer to perform a command.
    9·2 answers
  • Using C++
    15·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • A man-made world event that would affect the labor market would be a(n) _____.
    13·1 answer
  • Flash drives, CDs, external disks are all examples of storage (memory) devices.'True or false?
    9·1 answer
  • What is the data and information with example? ​
    9·1 answer
  • Which type(s) of license(s) allow the underlying software code to be viewed?
    15·1 answer
  • How can IT infrastructure be linked to the business strategy of any organization
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!