1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
13

1. Perform the following Binary Additions 101101 + 10100 *

Computers and Technology
2 answers:
daser333 [38]3 years ago
5 0

Answer:

Solutions:

Ans#1:

   101101

<u>+   10100 </u>

<u>1000001  </u>

<u />

Ans#2:

01010011

<u>+01110110</u>

<u>11001001 </u>

Ans#3:

101101

<u>- 10100 </u>

<u>011001  </u>

<u />

<u>Ans#4:</u>

<u />

11001011

<u>- 1010110 </u>

<u>10010100</u>

<u />

Explanation:

The given answers are in Binary.

In binary we add the digits in 1 and 0 form.

Addition in Binary:

1 + 0 = 1

0 + 1 = 1

0 + 0 = 0

1 + 1 = 10

Subtraction in Binary:

1 - 0 = 1

1 - 1 = 0

0 - 1 = 1 (it's because the 0 borrows a 1)

0 - 0 = 0

USPshnik [31]3 years ago
3 0

Answer:

1.         carry   1  1  1

                      1  0 1 1 0 1

                      +  1 0 1 0 0

                       ------------------------

   Answer: 1  0 0 0  0 0 1  

2.         carry  1 1  1 0 1  1  

                     0 1 0 1 0 0 1 1

                  + 0 1 1  1 0  1  1 0

                  --------------------------

    Answer: 0 1  1 0 0 1 0 0 1

3.                   1 0 1 1 0 1

                    -   1 0 1 0 0

                   -------------------------

       Answer: 0 1 1 0 0 1

4.                      1 1 0 0 1 0 1 1

                      -    1 0 1 0 1 1 0

                     -----------------------------

        Answer:   01 1 1 0 1 0 1

Explanation:

In Binary addition when you add 1 + 1 = 0, carry over the 1, i.e 10

in Subtraction when you subtract 0-1 = 1,  brow 1 from left side, resulting in -1 carried over.

You might be interested in
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
Multicurrency: There are several products that universal containers sells exclusively in Europe and the UK. Opportunities for th
ivanzaharov [21]

Answer:

D – Create a new validation rule that allows only EUR or GBP to be selected from all active currencies when an opportunity is created for these products.

Explanation:

Application containers are used to hold applications deployed to the internet during production. These containers are products of online hosting cloud services, used to control and maintain the application in production.

Access to the application's functionalities requires validation, the user must be authenticated and authorized to access certain services of the application.

5 0
3 years ago
What did czarnowski and triantafyllou learn from observing boat propulsion systems?
noname [10]
Czarnowski and Triantafyllou learned that boat propellers are not very efficient, except penguin propulsion systems.
7 0
3 years ago
Hello safiya77 this is for you
Ray Of Light [21]
Hello astropiggy!
Feel free to ask any question!
I’ll try my best to answer them!
5 0
2 years ago
Other questions:
  • What task can a user accomplish by customizing theme colors?
    14·2 answers
  • Two different ways to bring up My Computer folder
    11·1 answer
  • PLEASE HELP ME ASP<br> An ISDN carries a signal in digital form.<br><br> True<br><br> False
    12·2 answers
  • Which one of the following items is an example of software?
    12·2 answers
  • There are generally two ways of implementing dynamic programming solutions to problems, which have equal asymptotic time complex
    13·1 answer
  • John works in the Sales and Marketing group. Why does his group need to interact with operations management to plan the launch o
    12·1 answer
  • You are given an integer N, followed by N lines of input (1 &lt;= N &lt;= 100). Each line of input contains one or several words
    8·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • 2. The Warren Commission investigated the assassination of President _______________________ in 1964.
    6·1 answer
  • 8
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!