1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
5

. Convert your age into binary and then to hexadecimal. Show your work.

Computers and Technology
1 answer:
Dovator [93]3 years ago
5 0

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

You might be interested in
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
3 years ago
Why were video games invented?
Alenkinab [10]
The answer is in the following website: https://www.reference.com/history/were-video-games-invented-e9413d3dc1378766


4 0
3 years ago
The records in a database table are generally visualized as​ ________.
vekshin1
The records in a database table are generally visualized as rows

Rows should be the answer 
5 0
3 years ago
Describe the three-schema architecture. Why do we need mappings among schema levels? How do different schema definition language
VARVARA [1.3K]

Answer:

Three Scheme architecture contains internal level, conceptual level, and external level.

In the internal level physical structure of the database described. The internal Schema is also known as physical Schema, as it is used to define the data that stored in a block. Internal Schema describes a sophisticated level of data structure in detail.

The conceptual level design of the database has described, and it is known as a logical level. The conceptual level describes the whole structure of the database. It describes the relationships among the data. Implementation of data are hidden in a theoretical level

On the external level, databases contain schemas that represent a different view of the database. Each describes the database that the user interested in and hides the remaining database. The external database is also known as view schema.

Explanation:

The mappings between schema levels happen due to visualization and schema matching. DBMS has three schema level.

In the attached diagram

It shows the DBMS architecture.

Mapping is a way to transfer and respond to the request between the various database architecture.

Mapping takes more time to transfer data in small DBMS.

External / Conceptual mapping transforms the data from the outer level to the conceptual schema.

In Conceptual / Internal mapping, response transforms from conceptual to internal level.

Document Schema Definition Language (DSDL) is a framework in which multiple validations can be applied to achieve a complete validation result. In this way, schema definition language support this architecture.

8 0
3 years ago
A recently promoted employee at your company has called you because they attempted to log in to their computer several times wit
oksano4ka [1.4K]

Answer:

The user's account is blocked due to several unsuccessful login attempts.

Explanation:

Any device having a password security has a property of blocking the account or device in use after noticing several unsuccessful attempts of login.

So as a precautionary measure when the software notices such activity it blocks the access to that account so that any intruder might not be able to enter the account premises.

Same is the case with the employee who was trying to access his own account but due the expired password he made several attempts but couldn't log in. The software took it as an intruder and blocked the account.

The employee after requesting for password reset again tried to login but the account was blocked so he could not be able to access it again.

7 0
3 years ago
Other questions:
  • When inside a closed work environment, its okay to openly talk with co-workers about PII
    6·1 answer
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Now tell me how be rich like Bill Gates
    6·1 answer
  • What happens to a mechanical system when two opposing torques do not cancel out?
    7·1 answer
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • Please help me on this coding problem :)
    6·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • 3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!