1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
13

23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right

shift of 4 bits with sign extension. c. A left shift of 4 bits. d. A left rotate of 4 bits. e. A right rotate of 4 bits.
Computers and Technology
2 answers:
Taya2010 [7]3 years ago
8 0

Answer:

a. 0000 1001 0101 1100

b. 1111 1001 0101 1100

c. 0101 1100 0011 0000

d. 0101 1100 0011 1001

e. 0011 1001 0101 1100

Explanation:

Komok [63]3 years ago
3 0

Answer:

a) 0000 1001 0101 1100 b) 1111 1001 0101 1100 c) 0101 1100 0011 0000 d) 0101 1100 0011 1001 e) 0011 1001 0101 1100

Explanation:

a) in right shift of four bits, the four least significant bits on right are discarded and then the entire bit pattern is shifted to right side  . The left most significant bits are filled with zeros in case of zero fill.

b) in right shift of four bits, the four least significant bits on right are discarded and the entire bit pattern is shifted to right side. . The left most significant bits are filled with ones in sign extension.

c) in left shift of four bits, the four most significant bits on left are discarded and the entire bit pattern is shifted to left side.  The left most significant bits are filled with zeros in case of zero fill

d) In left rotate, the four most significant bits become four least significant bits of the bit pattern

e) In right rotate, the four least significant bits on right become four most significant bits of the bit pattern

You might be interested in
How can an individual find career data?
kolezko [41]
How can an individual find career data?a. using a libraryb. searching the webc. conducting an interview with someone in a particular fieldd. all answer choices are sources for finding career data?The answer is d. An individual can do all the option a, b, and c to find a better career data.
6 0
3 years ago
What is the troubleshooting process?
sattari [20]
<span>It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again.Troubleshooting is needed to identify the symptoms. ...Troubleshooting is the process of isolating the specific cause or causes of the symptom.</span>
6 0
2 years ago
Match the following technologies with their applications.
otez555 [7]

1. autonomic computing

2. virtualization

3. screenless displays

3-D printing

6 0
3 years ago
Consider ________ when designing for display on a mobile device. font size all of these contrast small screen size
Delvig [45]
To be honest...i really dont know 
6 0
3 years ago
Read 2 more answers
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
Other questions:
  • The process of starting or restarting a computer or mobile device is called __________.
    5·1 answer
  • Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
    6·1 answer
  • An example of how a merge field will appear in a document is ______.
    7·2 answers
  • Write a query to show the price reduced by 10% for all products that are tables or entertainment centers with a standard price g
    10·1 answer
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • What is the target audience of an ad?
    11·1 answer
  • What component of a processor holds instructions waiting to be processed by the alu?
    11·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    14·2 answers
  • What are the peripherals of a computer ​
    12·1 answer
  • The three main objectives of information security are.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!