Answer:
Here the code is given as follows,
#include <stdio.h>
#include <stdlib.h>
union floatingPoint {
float floatNum;
double doubleNum;
long double longDoubleNum;
};
int main() {
union floatingPoint f;
printf("Enter data for type float: ");
scanf("%f", &f.floatNum);
printf("\nfloat %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type double: ");
scanf("%lf", &f.doubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type long double: ");
scanf("%Lf", &f.longDoubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
return 0;
}
Which terms means device that converts one voltage to another ?
Answer:
I believe it is an adapter
Explanation:
An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.
explain the elements of structured cabling systems
Answer:
From this article, we can know that a structured cabling system consists of six important components. They are horizontal cabling, backbone cabling, work area, telecommunications closet, equipment room and entrance facility.
dismiss information I have here and hope you like it and hope you will get this answer helpful and give me the thankyou reactions
An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page
<!DOCTYPE html>
<html>
<body>
<h1>Heading or Title</h1>
<h2>Sub heading or sub title</h2>
</body>
</html>
This will be the html code for the given problem.
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Answer:
Kindly check explanation
Explanation:
Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.
A shell script could be written for a control flow construct :
if [expression]
then (command 1)
else (command 2)
.....
Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"
Answer:
choice.tolower == "y"
Explanation:
The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.
The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.
You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple normalized source databases that need consolidation for reporting and analytics. What type of database would you recommend and why
Answer:
The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.
Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.
Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?
Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?
To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.
Change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in: data culture and literacy.
Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.
The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.
So data culture and literacy should be used when trying to transform a client business into a data-driven, intelligent enterprise.
Learn more about data culture here:
https://brainly.com/question/21810261
The operating system (OS) of an information system contains the software that executes the critical functions of the information system. The OS manages the computer's memory, processes, and all of its software and hardware. It allows different programs to run simultaneously and access the computer's memory, central processing unit, and storage.
a. True
b. False
Answer:
a. True
Explanation:
An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.
Additionally, an information system comprises of five (5) main components;
1. Hardware.
2. Software.
3. Database.
4. Human resources.
5. Telecommunications.
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).
Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.
In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g
Answer:
Explanation:
Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.
import threading
import time
def thread_function(name):
print("Thread {name}: starting")
time.sleep(2)
print("Thread {name}: finishing")
thread1 = threading.Thread(target=thread_function, args=(1,))
thread1.start()
time.sleep(1)
thread2 = threading.Thread(target=thread_function, args=(2,))
thread2.start()
thread2.join()
Discuss the DMA process
Answer:
Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).
Explanation:
A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.
In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.
ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.
ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.
A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:
I/O addresses Memory addresses. Interrupt request numbers (IRQ). Direct memory access (DMA) channels.DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.
A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.
With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.
In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.
However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.
Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.
Answer:
See explanation
Explanation:
DMA [tex]\to[/tex] Direct Memory Access.
The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.
The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics
Answer: demographics
Explanation:
Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.
The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.
It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.
Which of the following is true for creating a new file?
a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None
Answer:
create a file with the same name as an existing file ,you will be prompted to rename your new file
Write a program that generates an array filled up with random positive integer
number ranging from 15 to 20, and display it on the screen.
After the creation and displaying of the array , the program displays the following:
[P]osition [R]everse, [A]verage, [S]earch, [Q]uit
Please select an option:
Then, if the user selects:
-P (lowercase or uppercase): the program displays the array elements position and
value pairs for all member elements of the array.
-R (lowercase or uppercase): the program displays the reversed version of the
array
-A (lowercase or uppercase): the program calculates and displays the average of the
array elements
-S (lowercase or uppercase ): the program asks the user to insert an integer number
and look for it in the array, returning the message wheher the number is found and
its position ( including multiple occurences), or is not found.
-Q (lowercase or uppercase): the program quits.
NOTE: Until the last option (‘q’ or ‘Q’) is selected, the main program comes back at
the beginning, asking the user to insert a new integer number.
Answer:
#include <iostream>
#include <cstdlib>
using namespace std;
const int MIN_VALUE = 15;
const int MAX_VALUE = 20;
void fillArray(int arr[], int n) {
// fill up the array with random values
for (int i = 0; i < n; i++) {
arr[i] = rand() % (MAX_VALUE - MIN_VALUE + 1) + MIN_VALUE;
}
}
void displayArray(int arr[], int n) {
for (int i = 0; i < n; i++) {
cout << i << ": " << arr[i] << endl;
}
}
void main()
{
int myArray[10];
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
fillArray(myArray, nrElements);
displayArray(myArray, nrElements);
char choice;
do {
cout << "[P]osition [R]everse, [A]verage, [S]earch, [Q]uit ";
cin >> choice;
choice = toupper(choice);
switch (choice) {
case 'P':
displayArray(myArray, nrElements);
break;
}
} while (choice != 'Q');
}
Explanation:
Here's a start. Now can you do the rest? ;-)
hi, please help me, please help me.
outline three difference each of a raster filled and vector file
Answer:
Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.
Explanation:
Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.
Answer:
phone grows everyday 82 percent
Explanation:
what is the python ?
Answer:
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
This is my Opinion.
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
Hope this helps you :)
5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E
Answer:
The answer is a bounced email
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue.
a. False
b. True
Changing the resolution should work, it’s most likely true. :)
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue is the true statement.
What is meant by resolution?In order to cover the cost of the pixels on the horizontal and vertical axes, resolution is the total number of pixels individual points of colour on a display monitor.
The size of the monitor and its resolution affect how sharp an image appears on a display.
Thus, the statement is true.
For more details about resolution, click here:
https://brainly.com/question/14307212
#SPJ2
Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.
Answer:
Code:-
#include <iostream>
using namespace std;
int main()
{
// take array size from user
int n;
cout << "Enter array size:";
cin >> n;
// Declare array size with user given input
int a[n];
// take array elements from user & store it in array
cout << "Enter array elements:";
for(int i=0 ; i < n ; i++){
cin >> a[i];
}
/* ----- Solution Starts ----- */
// i & j for checking disarray & count is for counting no. of disarray's
int i=1, j=0, count=0;
for(int k=0; k < n ; k++){
if(a[i] > a[j]){
// if disarray found then increament count by 1
count++;
}
// increament i & j also to check for further disarray's
i++;
j++;
}
// Print the disarray count
cout << "Pairs of disarray in given array:" << count;
/* ----- Solution Ends ----- */
return 0;
}
Output:-
Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1
Answer:
The program in Python is as follows:
cents = int(input("Cents: "))
qtr = int(cents/25)
cents = cents - qtr * 25
dms = int(cents/10)
cents = cents - dms * 10
nkl = int(cents/5)
pny = cents - nkl * 5
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
Explanation:
The program in Python is as follows:
cents = int(input("Cents: "))
This calculate the number of quarters
qtr = int(cents/25)
This gets the remaining cents
cents = cents - qtr * 25
This calculates the number of dimes
dms = int(cents/10)
This gets the remaining cents
cents = cents - dms * 10
This calculates the number of nickels
nkl = int(cents/5)
This calculates the number of pennies
pny = cents - nkl * 5
The next 4 lines print the required output
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has a UPS and a generator to protect against power outages Making sure there are no unmanaged third-party service level agreements Performing a walkthrough of the disaster recovery plan Testing that super user (SYSADMIN) access is limited to only appropriate personnel
Answer:
Testing that super user (SYSADMIN) access is limited to only appropriate personnel.
Explanation:
A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.
Which of the following will cause you to use more data than usual on your smartphone plan each month?
a. make a large number of outbound calls
b. sending large email files while connected to wifi
c. streaming movies from Netflix while not connected to Wi-Fi
d. make a large number of inbound calls
Give one example of where augmented reality is used
Answer
Medical Training
From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.
it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc
In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?
Answer:
variable with a leading sign, three fractioned digits after the decimal point
discribe two ways to zoom in and out from an image
Option 1: Spread your fingers on your laptop's trackpad.
Option 2: Press Command (or control) and the + sign.
Hope this helps!
Have a wonderful day!
What will be the pseudo code for this
Answer:
Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.
create a variable(userInput) that stores the input value.
create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it
Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)
Actual python code:
def main():
userInput = int(input("Fahrenheit to Celsius: "))
celsius = (userInput - 32) * (5/9)
print(str(celsius))
main()
Explanation:
I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.
c)what formula would be in the cell E2
Excel will generally be able to handle any properly-input mathematical formula, if valid operators are used. Commonly used operators include "+" (addition), "-" (subtraction), "*" (multiplication) and "/" (division). (Microsoft has a complete list of valid operators to be used in Excel formulas on the Office website). Here are some examples of formulas using common operators:
Formula Description
=C2-B2 Subtracts contents of B2 from contents of C2
=C2/B2 Divides contents of C2 by contents of B2
=(B2+C2+D2)/3 Adds contents of B2, C2, and D2 and divides result by 3
After hitting "Enter", the cell will display the calculated value, while the formula bar will still display the formula. (Note: Always hit “Enter” when finished entering a formula, manually. If you click off the cell, the cell you click to will be added to your formula.)Formulas
Formulas in Excel are basically mathematical expressions that use cell references (e.g., “A5”,” D17”) as arguments. For example, a formula that adds the contents of cell E5 and E6 could be written as follows:
= E5+E6
(Note: all formulas in Excel need to be preceded by an “=” sign.) If the values contained in E5 and E6 are 6 and 11, respectively, the formula will produce 17 as the value it displays. If you change E5 to 7, the result will automatically change to 18.
Example
Let's say you were putting together an office supply order, and you wanted to keep track of much you were spending. You could put together a spreadsheet like the one below, with the list of items to be purchased, their unit prices, the number of each item ordered, and the total spent for each. It would make sense to enter the things you know in advance (like the price of individual items and the number ordered), but you could let Excel calculate the totals for you. For the first item listed below (pencils), this could be done by making the value of the total price (cell D2), the value of the unit price (held in cell C2) multiplied by the number of items ordered (held in D2). This formula would be written "=B2*C2".
Once you click "OK", your completed formula will be input into the cell.
Copying and pasting formulas
Often, you will need Excel to do a series of similar computations, where the only things that will change are the cells used as arguments. For instance, in the example above, you would probably like Excel to calculate the Total Price for each item in the order. You could re-input the same formula used to get the total price for pencils in each cell in that row, just changing the cells referenced (i.e. "=PRODUCT(B3:C3)", "=PRODUCT(B4:C4)", etc.), but Excel has simpler method for this. If you have multiple cells in the same row or column that need to do the same computation, you can simply copy the value in the cell you entered a formula, and then paste it into the subsequent cells. Excel will then automatically adjust which cells are included in the formula, based upon which cell the formula was pasted to. So, if the original formula entered in D2 was "=PRODUCT(B2:C2)", the formula pasted into D4 would be "=PRODUCT(B4:C4)"
More simply, if you have a formula you want repeated in a number of directly adjoining cells, you can just click and drag the bottom right corner of the cell with the original formula (see image below) onto the cells you want the same formula entered, and Excel will automatically copy and paste the formula for you, with appropriate adjustments made to the cell numbers in the formula.
After selecting "PRODUCT" and clicking OK, you will get another dialog box, that allows you to select the cells to be multiplied. You can do this for individual cells, by selecting cells separately in the "Number1" and "Number2" boxes shown below, or by selecting an array of cells, by clicking and dragging on the range cells you want to use on the spreadsheet, itself. (Note: if you try to enter a formula in a cell using the Insert Formula button and there are adjacent cells with numbers, Excel will often select those cells automatically, so make sure the cells selected in the dialog box are the correct ones.) Excel also has built-in functions that can do a lot of useful calculations. These are most easily accessed by hitting the Insert Function button, which is represented by the “fx” symbol next to the formula bar. For example, instead of entering the formula shown above, the same result could have been achieved using the built-in "PRODUCT" function by clicking in cell D2 and hitting the Insert Formula button. This would give a dialog box like the one shown, below.
After choosing “PRODUCT” and pressing OK, a new dialogue box will appear where you may choose which cells should be multiplied. By selecting particular cells in the “Number1” and “Number2” boxes as shown below, you can do this for specific cells.
What is the formula would be in the cell E2Additionally, Excel contains many useful built-in functions that can perform calculations. The button shown by the “fx” sign next to the formula bar, “Insert Function,” can be used to access these the simplest way by clicking it.
Make sure the cells selected in the dialogue box are the proper ones because if you try to insert a formula in a cell using the Insert Formula button and there are adjacent cells containing numbers. Excel will frequently select those cells automatically.)
Therefore, by deciding a range of cells on the spreadsheet itself by clicking and dragging on the desired range of cells.
Learn more about cell E2 here:
https://brainly.com/question/6961706
#SPJ2
Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity
Answer:
The algorithm is as follows:
1. Start
2. Capacity = 100%
3. Input Status (True/False)
4. While Status == True
4.1. Read Quantity (%)
4.2. Capacity = Capacity - Quantity
4.3. If Capacity < 40%
4.3.1 Display Yellow Flash
4.4. Input Status (True/False)
5. Stop
Explanation:
This starts the algorithm
1. Start
The capacity of the machine is initialized to 100%
2. Capacity = 100%
This gets the status of the sales
3. Input Status (True/False)
The following iteration is repeated until the status is false
4. While Status == True
Read current sales quantity from the user
4.1. Read Quantity (%)
Remove the quantity from the capacity
4.2. Capacity = Capacity - Quantity
Check is capacity is below 40%
4.3. If Capacity < 40%
If yes, display yellow flashes
4.3.1 Display Yellow Flash
This gets the status of the sales
4.4. Input Status (True/False)
End algorithm
5. Stop
1011 0110 10102 = ?16
Answer:
B6A
Explanation:
I think you want to convert binary to hex.
Hexadecimal or "hex" is a numbering system which uses 16 different numerals. We saw that decimal used ten numerals from 0 to 9. Hex expands on this by adding six more, the capital letters A, B, C, D, E and F.
0...1...2...3...4...5...6...7...8...9...A...B...C...D...E...F
Steps to Convert Binary to Hex
1. Start from the least significant bit (LSB) at the right of the binary number and divide it up into groups of 4 digits. (4 digital bits is called a "nibble").
2.Convert each group of 4 binary digits to its equivalent
hex value .
3.Concatenate the results together, giving the total hex number.