1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
13

23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right

shift of 4 bits with sign extension. c. A left shift of 4 bits. d. A left rotate of 4 bits. e. A right rotate of 4 bits.
Computers and Technology
2 answers:
Taya2010 [7]3 years ago
8 0

Answer:

a. 0000 1001 0101 1100

b. 1111 1001 0101 1100

c. 0101 1100 0011 0000

d. 0101 1100 0011 1001

e. 0011 1001 0101 1100

Explanation:

Komok [63]3 years ago
3 0

Answer:

a) 0000 1001 0101 1100 b) 1111 1001 0101 1100 c) 0101 1100 0011 0000 d) 0101 1100 0011 1001 e) 0011 1001 0101 1100

Explanation:

a) in right shift of four bits, the four least significant bits on right are discarded and then the entire bit pattern is shifted to right side  . The left most significant bits are filled with zeros in case of zero fill.

b) in right shift of four bits, the four least significant bits on right are discarded and the entire bit pattern is shifted to right side. . The left most significant bits are filled with ones in sign extension.

c) in left shift of four bits, the four most significant bits on left are discarded and the entire bit pattern is shifted to left side.  The left most significant bits are filled with zeros in case of zero fill

d) In left rotate, the four most significant bits become four least significant bits of the bit pattern

e) In right rotate, the four least significant bits on right become four most significant bits of the bit pattern

You might be interested in
Which is true regarding pseudocode?
bearhunter [10]

Answer:

It uses simple words and symbols to communicate the design of a program

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.

8 0
2 years ago
Read 2 more answers
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
ella [17]

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.

3 0
3 years ago
Novice drivers lack the experience necessary to reliably categorize and appropriately respond to ___________ hazards.
meriva

Answer:

roadside

Explanation:

Novice drivers lack the experience necessary to reliably categorize and appropriately respond to roadside hazards. A roadside hazard refers to any roadside objects or features that have a diameter greater than 100mm that is on or near the roadway. These are objects or features that are likely to create a dangerous environment to the drivers.

7 0
3 years ago
What port number is the web server listening on for the web request?
Veronika [31]
80 for HTTP, 443 for HTTPS
8 0
3 years ago
What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe you
densk [106]
B. Completely describe your entire thought process
3 0
3 years ago
Other questions:
  • The most popular input device of a computer is a(n) ____.
    6·1 answer
  • Use the image above to determine which toolbars will be displayed in the program you are using. SELECT ALL THAT APPLY
    11·2 answers
  • What two actions does the RETI instruction perf orm? Why must these two actions be done in a single instruction, as opposed to a
    6·1 answer
  • An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q
    8·1 answer
  • Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned o
    10·1 answer
  • It is not important to keep financial records since they can all be found online.
    5·2 answers
  • Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which o
    10·2 answers
  • Anyone else having problems with edg?
    9·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • Please please help I don’t understand this please.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!