Browse Definitions :
Definition

Hexadecimal describes a base-16 number system. That is, it describes a numbering system containing 16 sequential numbers as base units (including 0) before adding a new position for the next number. (Note that we're using "16" here as a decimal number to explain a number that would be "10" in hexadecimal.) The hexadecimal numbers are 0-9 and then use the letters A-F. We show the equivalence of binary, decimal, and hexadecimal numbers in the table below.

Hexadecimal is a convenient way to express binary numbers in modern computers in which a byte is almost always defined as containing eight binary digits. When showing the contents of computer storage (for example, when getting a core dump of storage in order to debug a new computer program or when expressing a string of text characters or a string of binary values in coding a program or HTML page), one hexadecimal digit can represent the arrangement of four binary digits. Two hexadecimal digits can represent eight binary digits, or a byte.

0 0 0
1 1 1
10 2 2
11 3 3
100 4 4
101 5 5
110 6 6
111 7 7
1000 8 8
1001 9 9
1010 10 A
1011 11 B
1100 12 C
1101 13 D
1110 14 E
1111 15 F
10000 16 10
10001 17 11
etc etc etc
This was last updated in September 2005

#### Join the conversation

Send me notifications when other members comment.
Cancel
i dont like numbers
Cancel
same...
Cancel
nonce
Cancel
sana all
Cancel

## SearchCompliance

• ### risk assessment

Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

• ### PCI DSS (Payment Card Industry Data Security Standard)

The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

• ### risk management

Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

## SearchSecurity

• ### CISO as a service (vCISO, virtual CISO, fractional CISO)

A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership...

• ### access control

Access control is a security technique that regulates who or what can view or use resources in a computing environment.

• ### advanced persistent threat (APT)

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

## SearchHealthIT

• ### HIPAA (Health Insurance Portability and Accountability Act)

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security ...

• ### telemedicine (telehealth)

Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

• ### Project Nightingale

Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

## SearchDisasterRecovery

• ### call tree

A call tree is a layeredÂ hierarchicalÂ communication model that is used to notify specific individuals of an event and coordinate ...

• ### Disaster Recovery as a Service (DRaaS)

Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

• ### cloud disaster recovery (cloud DR)

Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

## SearchStorage

• ### FCoE (Fibre Channel over Ethernet)

FCoE (Fibre Channel over Ethernet) is a storage protocol that enable Fibre Channel (FC) communications to run directly over ...

• ### Fibre Channel switch (FC switch)

A Fibre Channel switch is a networking device that is compatible with the Fibre Channel (FC) protocol and designed for use in a ...

• ### SAN switch (storage area network switch)

A storage area network (SAN) switch is a device that connects servers and shared pools of storage devices and is dedicated to ...

Close