1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
5

Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa

tion: the string Inventory followed by a value (569)10 followed by another string Price followed by a value (49.75)10. Also, assume that floating point numbers are stored as single-precision IEEE 754 with 127 excess. a) Show (as hex numbers with word boundary) how this is stored on a big-endian machine. b) Show (as hex numbers with word boundary) how this is stored on a little-endian machine.
Computers and Technology
1 answer:
Tresset [83]3 years ago
7 0

Answer:

Internet protocol, IP address are 32- bit binary numbers.

Explanation: Each 32- bit is represented in 4- 8 bits segments

a) 10,11,13,14,  0,0,10,13,  0,11,12,13,  11,12,13,14,  0,0,0,11,  0,0,13,14,  10,12,13,14, O,10,13,14

b)

You might be interested in
Help<br> pls need quickly
g100num [7]

Answer:

Themes

Explanation:

  1. In the slide thumbnail pane on the left, select a slide.
  2. On the Design tab, in the Themes group, click the More button (illustrated below) to open the entire gallery of themes:
  3. Point the mouse at the theme you want to apply. Right-click it, and then select Apply to All Slides.
3 0
3 years ago
Which layer of the OSI model do network administrators typically check first when issues arise?
bazaltina [42]

Answer:

B

Explanation:

Typically I check the physical layer to ensure that the nodes are plugged accordingly.

4 0
2 years ago
It is important to analyze the sources and uses of cash because:___.
sergey [27]

It is important to analyze the sources and uses of cash because creditors use this information to assist them in deciding whether to loan funds to them. Investors use this information to decide if they will purchase their stock.

Managing your revenue is an important step to starting or investing in something.

Creditors always check and properly analyze the sources of cash before providing a loan to a lender. They do not invest in companies or people who are least likely to source and make cash in the coming time. Hence, your sources and uses shall be properly analyzed when presenting to creditors.

Investors, whenever investing in something will look at the benefits of the source they want to invest into. If a source is not likely to produce beneficiary revenue in the upcoming time, then investors will never invest in such a kind of source.

To learn more about investors, click here:

brainly.com/question/25311149

#SPJ4

5 0
2 years ago
A commonly-used estimate for the number of bytes needed to store one
Basile [38]

Answer:

0.127 miles ; 5.458 *10^8 miles

Explanation:

Number of bytes needed to store a page = 2000

Number of pages (Harry Potter's book) = 800

Total memory required to store entire book = (2000 * 800) = 1600000 = 16 * 10^5 bytes

Hence,

1 byte of memory will store : (height of each book / memory size of each book)

= 3 ÷ 16 * 10^5

= 1.875 * 10^-6

For 32 bit memory space :

(1.875 * 10^-6 * 2^32) = 8053.06368 inches

1 inch = 1.578 * 10^-5 mile

8053.06368 inches = 8053.06368 * (1.578 * 10^-5) = 0.1270773448704 miles

= 0.127 miles

For 64 bit memory size :

(1.875 * 10^-6 * (2^64)) = 3.45876 * 10^13 inches

(3.45876 * 10^13) * (1.578 * 10^-5)

= 5.458 *10^8 miles

3 0
3 years ago
WordArt ____ in the interior of a letter can consist of a solid color, texture, picture, or gradient.
Svetach [21]
WordArt fill in the interior of a letter can consist of a solid color, texture, picture, or gradient. 
3 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
    8·1 answer
  • What allow you to write alphas on a computer keyboard
    10·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Select the correct word to complete the sentence
    11·2 answers
  • What will result if the following code is used in an HTML file? New Title
    13·2 answers
  • Who is credited with writing Google's famous page ranking search algorithm?
    13·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • When memory allocation is ____, it means all portions of the program and OS are loaded into sequential locations in memory.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!