Determine the equivalent hexadecimal form of decimal number, Computer Engineering

Assignment Help:

Solve the equation 65.53510 = X16

Ans. In order to get X, convert the Decimal number 65.535 in its equal Hexadecimal form. So first taking 65 the integer part to convert in its equivalent Hexadecimal form.

2120_Determine the equivalent Hexadecimal form of Decimal number.png

Thus 6510 = 4116
After that take the decimal fractional part 0.6 for convert in its equivalent binary form.

Fraction

Fraction X 16

Remainder new

fraction

Integer

0.535

8.56

0.56

8

0.56

8.96

0.96

8

0.96

15.36

0.36

15 (F)

0.36

5.76

0.76

5

0.76

12.16

0.16

12(C)

0.16

2.56

0.56

2

0.56

8.96

0.96

8

 This is seen that this is impossible to find a zero as remainder even after 7 stages. So the process can be further continued or an approximation can be made as well as the process terminated now there. The Hexadecimal equivalent is 0.88F5C28.
Thus 65.53510 = 41.88F5C2816.


Related Discussions:- Determine the equivalent hexadecimal form of decimal number

Cloud computing assignment, In the module on WSDL you were presented with t...

In the module on WSDL you were presented with the details of the WSDL service that receives a request for a stock market quote and returns the quote. The basic structure of a WSDL

Carry save addition and generated and propagate function, Explain carry sav...

Explain carry save addition (CSA) process. Ans: Instead of allowing the carries ripple along the rows, they can be saved and then introduced into the next roe at the right wei

Explain the uses of thumbwheels, Explain the uses of thumbwheels Two t...

Explain the uses of thumbwheels Two thumbwheels are usually required to control the screen cursor in its horizontal and vertical position respectively. As the name implies,

Automated injection, There are tools to automate the process of SQL Injecti...

There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a one tool, will be to search out a number of weak targets using Goo

Why java is called machine independent, Why Java is called Machine Independ...

Why Java is called Machine Independent? While a java program is compiled this is not converted in an executable code. Rather, this is converted in a byte code. Byte code is hig

Binary resolution, Binary Resolution: However we saw unit resolution f...

Binary Resolution: However we saw unit resolution for a propositional inference rule in the previous lecture:  (A?  B,   ¬B) /A Thus we can take this a little further to

What are addressing modes, What are Addressing Modes Many of instructio...

What are Addressing Modes Many of instructions that a computer actually executes during running of a program concern movement of data to and from memory. It is not possible sim

Determine the decimal equivalent of binary number, The decimal equivalent o...

The decimal equivalent of Binary number 11010 is ? Ans. 11010 = 1 X 2 4 + 1 X 2 3 + 0 X 2 2 + 1 X 2 1 = 26.

State about the object oriented analysis design, State about the Object ori...

State about the Object oriented analysis design Object oriented analysis design (OOAD) is a bottom up approach which supports viewing system as a set of components (objects) w

Determine the bandwidth requirement of a telephone channel, The bandwidth r...

The bandwidth requirement of a telephone channel is (A)  3 KHz                                      (B)  15 KHz (C)  5 KHz                                      (D)  25 KH

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd