1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
5

Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa

tion: the string Inventory followed by a value (569)10 followed by another string Price followed by a value (49.75)10. Also, assume that floating point numbers are stored as single-precision IEEE 754 with 127 excess. a) Show (as hex numbers with word boundary) how this is stored on a big-endian machine. b) Show (as hex numbers with word boundary) how this is stored on a little-endian machine.
Computers and Technology
1 answer:
Tresset [83]3 years ago
7 0

Answer:

Internet protocol, IP address are 32- bit binary numbers.

Explanation: Each 32- bit is represented in 4- 8 bits segments

a) 10,11,13,14,  0,0,10,13,  0,11,12,13,  11,12,13,14,  0,0,0,11,  0,0,13,14,  10,12,13,14, O,10,13,14

b)

You might be interested in
Which of the following is the ribbon path to the cell styles button? (home tab | styles group) (styles tab | home group) (home t
Alekssandra [29.7K]
I guess you talk about Excel. I'm pretty sure that that the path to the cell styles button looks like this <span>home tab | styles group. It's the most common pass. But in other cases, it depends on the software you use.</span>
5 0
3 years ago
If a document reaches you, and requires you to perform some action, you should do it immediately if ________. a. It is from your
tatyana61 [14]
C is the answer to this
8 0
4 years ago
Can an apple watch break or have a camera?
Viktor [21]

Answer:

apple watches can break, and they can deffinetly have cameras if they engineered right.

Explanation:

5 0
2 years ago
You would like to set up an online meeting to communicate with colleagues on a group project. Which of these tools should you us
sukhopar [10]
WordPress, really easy to use !
7 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Other questions:
  • What dose it need For a device to be considered a kind of computer
    14·2 answers
  • In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
    15·1 answer
  • URGENT!! Which graphic design tools help you draw circles and rectangles?
    12·2 answers
  • A ________ is a dummy function that is called instead of the actual function it represents, to test that the call to and return
    8·1 answer
  • Write a program to read 2 numbers and display the largest of the two. You should use scanfto read the two numbers and use if sta
    8·1 answer
  • At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
    12·1 answer
  • What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?
    10·1 answer
  • Which deployment tool will you use to deploy metadata from one organization to another organization?
    6·1 answer
  • PLEASE HELP!
    5·1 answer
  • Click print to publish your post in a blog true or false.​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!