Answer:
1BD.C
Explanation:
Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.
For example :
- (1)8 = (001)2
- (2)8 = (010)2
- (3)8 = (011)2
The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.
For example:
- (F)16 = (1111)2
- (1)16 = (0001)2
- (6)16 = (0110)2
Step 1: Split your octal number in digits and convert to binary form
6 7 5 . 6
110 111 101 . 110
Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)
binary complete: 110111101.110
binary in groups of 4:
1 1011 1101 . 110
Complete the groups with zero's (Remember the important note):
0001 1011 1101 . 1100
Step 3: Calculate the hexadecimal number
1 B D . C
Answer:
There are two types of image processing software, raster-based, and vector-based. The CAD and the CAID are just the two vectors based software. However, there is much other software like Adobe Illustrator, Microsoft Publisher, Corel Draw, Photoshop on which you can embark upon, and become an equally good Graphics designer. And hence, you can certainly become a Graphics designer with the CAD experience, however, you should keep in mind that all the great Graphic designers use CAD and CAID. And hence, you should use it sometimes certainly in the future.
Explanation:
Please check the answer section.
It's a. You have to move to the item thus pointing ;D
Answer: Phreaker
Explanation:
Phreaker is defined as the unauthorized attack on authorized communication system for stealing and manipulation phone networks.
- Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
- Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
- Thus, the correct option is option(d)