In this Math tutorial, you will learn how to convert a mixed number into an improper fraction. The narrator explains the process in a very concise yet simple manner that will make math problems involving mixed numbers so much easier to solve. The general idea is to multiply th ...more
Interested in converting numbers both into and out of scientific notation? This free video lesson will teach you everything you'll need to know. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to ...more
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat! I've usually stuck to computers and security in the past, so I thought I'd toss things up a bit and give yo ...more
Learn how to add rational, or fractional, numbers by following the tutorial in this video. In the case of fractions where the denominators are the same, the addition is simple: you simply add the numerators and keep the denominator the same. When the denominators are not the s ...more
How to Article: Plan a Camping Trip for a large group It may be more work that you thought, but following these steps is sure to prove you know what you’re doing! Invites Formulate a List of People to Invite This number should be between 10-50 Note that group sites always ...more
In this video the instructor shows how to make a simple flash click-through photo gallery with Action Script 3. First the instructor shows a sample gallery that you can make using this tutorial. To do this open a new flash action script 3.0 file. The first thing you have to do ...more
In order to divide mixed numbers, you should change the mixed numbers into improper fractions. With the problem 5 ¼ divided by 2 3/8, you should convert both mixed fractions to improper fractions. 5 ¼ becomes 21/4, when you multiply 4 times 5 and add one. 2 3/8 becomes 19/8, ...more
If you use Microsoft Office Excel on anything resembling a regular basis, odds are you work with numbers. Put those numbers to work with this free MS Excel video tutorial, which will teach you how to use a number of Excel's basic statistical functions (e.g., STDEV, AVERAGE, ME ...more
For this particular example, I will be working on Wndows (sorry X users). I might write a similar guide once I am more comfortable with programming in Linux. What You Will Need Visual C# 2010 Express (Get it here) Pirate Metal Source Code (For when you are done with the guid ...more
In this video we learn how to convert recurring decimals to fractions. Start off by writing out the decimal with the dot next to it to show that it's recurring. This means that the number goes on forever and doesn't stop. To convert this to a fraction, write down the number as ...more
Sometimes it is much easier to work out an equation if your numbers are in decimal form instead of fractions. This is especially useful if you are using a basic calculator. Check out this tutorial and learn exactly how to convert fractions into decimals in math class. So, if y ...more
In this tutorial, we learn how to multiply & divide fractions & mixed numbers. When multiplying and dividing fractions you don't need a common number, you just multiply straight across. When dividing, you simply flip the second fraction over and multiply straight across like n ...more
This how-to video explains about how to add fractions with uncommon denominators. To add fractions with uncommon denominators three steps are involved: 1)Find the lowest common denominator 2)Covert to the higher equivalent fractions 3)Add and reduce Let's see this with an ...more
In this math tutorial the instructor shows us how to add three fractions with common denominators. He says that it is similar to adding two fractions with common denominator. He tells us first to add all the numbers in the numerator which gives us a new number which is the num ...more
This video teaches "How to solve Formula Problems". You will be given numbers to replace all letters in the formula EXCEPT one. Plug all numbers into their places, then solve with algebra to find the only remaining variable. The video illustrates the procedure using two exa ...more
Here you'll be shown how to take the equation of a circle, and convert it into standard form. Also, it will be explained just what standard form is, while running through the process of conversion. You'll be able to use techniques to quickly work off the numbers on the equatio ...more
The new version of Microsoft Office has a feature which allows you to batch create PDFs. You can easily convert whole folders or specfic selections of Word, Excel or PowerPoint files into PDF files. You also have the option of converting the files into individual PDFs, or turn ...more
This video teaches you to subtract mixed numbers with borrowing. Consider 2 mixed numbers. For example 8 and 2/7 and the other 5 and 4/5.You have to subtract 5 and 4/5 from 8 and 2/7. First you have to convert the fractions to their common denominator. To equate the denominato ...more
In this how to video, you will learn how to create a diagonal sum in Microsoft Excel 2007. First, open the program and make a large selection. Type in =int(rand()*500) and then press control enter. This will create random numbers for the cells in the selection. From here, clic ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
Despite what we all argued in school, math does come up in daily life. When those dreaded fractions are staring you in the face remember these steps and you will be multiplying in no time. Practice always helps. Do you need two and a half dozen cookies, but a recipe only make ...more
Cancer cells do a pretty good job of flying under the radar of our immune system. They don't raise the alarm bells signaling they are a foreign invader the way viruses do. That might be something scientists can change, though. A team of researchers has built non-infectious ar ...more
Researchers have been studying the blood meals of flies to understand the flow of infectious pathogens in wild animals. Prior studies have shown that DNA from animals hosting pathogens like malaria and Zika are preserved in the blood meals of flies, so scientists are using th ...more
Immigration and immigration policy are some of the biggest discussions happening in international and domestic politics right now. From building walls to opening borders, a definitive plan has not been made about how to deal with the large number of people who are fleeing thei ...more
Facebook really wants your phone number, nagging you for one as soon as you join. This isn't all bad since it can help secure your account with two-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook, i ...more
Streptococcus and staphylococcus bacteria produce toxins that can cause toxic shock syndrome. Originally associated with infections related to tampon use, today more than half of the infections are due to other types of infection. Skin infections, burns, and surgical sites ca ...more
In python, or any scripting language for that matter, there are certain things that you will carry with you throughout your entire scripting career. Some of the most basic things that you will keep with you are output, variables, and their value types. We'll start by going ove ...more
Over 6,500 waterfowl—mostly ducks—have died in Canyon County, Idaho, stricken by avian cholera. The outbreak started in February, and before it's over, it may not only be Idaho's largest outbreak, but one of the largest in the country. Avian cholera is caused by infection wit ...more
There are times when leadership is tested. This is one of those times. As government and business leaders around the world are grappling with the unfolding coronavirus pandemic, the real-time responses to the crisis from many leaders have been great and, at times, less-than-op ...more
Prion diseases are a group of infectious brain diseases that causes extensive tissue damage, resulting in sponge-like spaces in brain tissue. Prions include Creutzfeldt-Jakob disease in humans, bovine spongiform encephalopathy (often called mad cow disease), and chronic wastin ...more
Solving Equations with Fractions Using Addition In our first example, our equation is b - 11/10 = -13/5 We need to find out what the variable, 'b', is. A variable is a symbol that stands for an unknown number. To do so, we have to isolate the variable, meaning that we have t ...more
In just a few weeks, on May 29, the annual AWE (Augmented World Expo) conference will take place once again in Silicon Valley (Santa Clara, California, to be exact). And while everyone will be on the lookout for the next big thing in augmented reality coming from major player ...more
The third developer beta for iOS 13 has been out since July 3, and while devs have had fun exploring all the new features, those of us on the public beta have sat on the sidelines running the public version of dev beta 2. But we don't need to wait any longer, as Apple just rel ...more
On July 3, Apple pushed out iOS 13 developer beta 3 for iPhone, and there's a lot found hidden within. A new FaceTime setting, more Arcade details, full-page scrolling screenshots everywhere, a noise cancellation option in the Control Center, and a new markup tool — and that's ...more
The wait wasn't so long this time. Apple released public beta 3 for iOS 13 on Thursday, July 18, just one day after the release of developer beta 4. For context, Apple took five days to seed public beta 2 after releasing dev beta 3, so it's a pleasant surprise that the latest ...more
We're pumped for iOS 13 and all of the fresh features and changes that come with it. Developer beta 3 came with new features in the double digits, including AR eye contact in FaceTime and mouse cursor size customization. Developer beta 4, released today, has a few more additio ...more
While autonomous vehicles are almost assuredly the future of personal transportation, we are likely many years from seeing self-driving cars become as ubiquitous as manually-driven ones, as the auto industry has a myriad of government regulations and other constraints to conte ...more
When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called r ...more
Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be a ...more
2 + 2 = 4. That's about as much math as I can handle without a calculator on a daily basis. I literally hate doing math more than anything in life, mostly because I'm not good at it—and I hate doing things I'm not good at. So, when I come across a cool math trick online that ...more
Uber wants you to forget about cars and start thinking about fully autonomous flying as an alternative—a more "economically favorable" way of getting to your grinding nine-to-five. Last October, Uber showed off Uber Elevate, a concept that the company calls the "future of on- ...more
When a new jailbreak method comes out, Apple is quick to patch the vulnerability it exploits by issuing a new iOS update. If you were to accept such an update, you'd no longer be able to jailbreak your iPad, iPhone, or iPod touch unless you could roll back your firmware to a v ...more
Welcome back, my greenhorn hackers! As expected with Null Byte's dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of networking. In addition, with the new "White Hat" certifications coming out shortly, the exam wi ...more
Check it out: you save more dough (ba dum bump) when you order a large pizza than with any other size. Why is this true? NPR reporter Quoctrung Bui's engineer friend pointed out that a medium pizza was twice as big as a small one, yet only cost slightly more. Less Money, Mo' ...more
I never really cared much for the clock widget on my Nexus 7, mainly because it only gave me two styles—analog and digital. There are many different styles of clock widgets available on Google Play, but the majority of them just don't look good enough for me. Ideally, I'd lik ...more
In this first part of our tutorial series on making physical objects come to life on HoloLens, we are going to set up Vuforia in Unity. I would plan to keep a Vuforia tab open in your web browser throughout most of this tutorial, and when developing in general, since Vuforia ...more
Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensiv ...more
There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're conc ...more
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user c ...more
Why can't I see who is stalking my Facebook profile? There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature. Regular users can see a recent list of who has been spying on you, along with some ...more
It's not easy staying fit and healthy these days with addicting phones, oversized portions, and long workdays, to name just a few things. To succeed, it takes work, commitment, and an understanding of your mind and body — and your iPhone can help you with some of that. While A ...more
You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more
On May 17, Apple announced that Lossless Audio playback for Apple Music was finally coming to subscribers in June. The long-awaited option will let users stream songs at a much higher quality than ever before. Still, in the fine print, Apple noted that you wouldn't be able to ...more
The Calculator app is probably one of Apple's most-used iPhone apps, yet I always meet people who don't know all the little tricks there are to using it more efficiently. You may know most of them, but there's a chance you don't or at least forget about some of them. What a " ...more
If you have a taste for sweets, you have at least one thing in common with mosquitoes. While too much sugar is unhealthy for humans, a new product makes sweets deadly to mosquitoes. At a presentation at the 254th meeting of the American Chemical Society, in Washington DC, res ...more
Welcome back! In our last training session we covered classes and how OOP can make programming/scripting easier. Today we'll be taking a breather and covering something fairly simple, bitwise operators. Bitwise operators are relatively simple. Essentially, when we use bitwise ...more
Chrome, Firefox, and Safari all provide built-in features that allow you to save your username and password for your favorite sites, making the process for entering your credentials a breeze when you revisit them. While this automation does make your life a little easier, it ...more
As practically the entire Steampunk world knows by now, IBM has predicted that Steampunk will be the big new trend from 2013 to 2015. They based this prediction on their computers, which sift through broad swathes of the internet in order to see patterns that may help commerci ...more
The year was 1947. Scientists had isolated a virus from a pyrexial rhesus monkey in Uganda and named it after the forest where the monkey lived — Zika. Then, a little more than a year ago, in the fall of 2015, health officials in Brazil reported a sharp increase in the number ...more
By now, you've probably already installed 10.10 Yosemite, the newest version of Mac OS X, on your computer. While you most certainly noticed the visual changes, you might have missed some of the really cool additions. We've spent the last few days getting to know it, and let ...more