1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
9

Do you guys know the addition and subtraction of binary numbersi need help in that

Computers and Technology
1 answer:
Gala2k [10]3 years ago
4 0

Answer:

The process of adding binary numbers is the same as the process adding decimal numbers which are the normal base 10 numbers with the difference being that in decimal numbers there are digits 1 to 9 and in binary numbers, there are only digits 1 and 0

So when we add binary numbers, we havr;

0 + 0 = 0

1 + 0 = 1

0 + 1 = 1

1 + 1 = 10

Why 1 + 1 = 10 is because, there are no 2s in binary number system, just like when we get from 0 to 9 in a decimal system we start again at 10

For binary subtraction, we have the following;

0 - 0 = 0

1 - 0 = 1

1  - 1 = 0

10 - 1 = 1 (from 1 + 1 = 10)

For example 1100₂ - 1010₂ = 0010₂

As shown below

Borrow 1

,     ↓

 1, 1 ¹0 0

<u>  1, 0 1 0</u>

, 0  0  1  0

The addition and subtraction of the binary number system are similar to that of the decimal number system. The only difference is that the decimal number system consists the digit from 0-9 and their base is 10 whereas the binary number system consists only two digits (0 and 1) which make their operation easier

Explanation:

You might be interested in
Thoughts on copyright?
Nataliya [291]

Answer:

Don't do it. People will sue you even though it was put on the internet.

Explanation:

7 0
2 years ago
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform addr
iris [78.8K]

Answer: Media access control layer (MAC layer)  

Explanation:

The media access control layer is also known as MAC layer. The main function of the media access control layer is that it is used in the transmission of the data into the frame and perform the error detection and the address recognition which basically govern the accessing to the local area network (LAN) transmission medium.

The media access control layer is basically responsible for transmission of the data packets from NIC (Network interface card) to the another channel.

8 0
3 years ago
A tower or mini tower pc is a type of all- in -one unit true or false
Svetlanka [38]

Answer:

thx

Explanation:

5 0
3 years ago
Read 2 more answers
If you find yourself boxed in by a vehicle on your left or right _____________
Zepler [3.9K]

Answer: A. speed up or slow down briefly

Explanation:

put that and then i saw someone said b and it was wrong and i got mad because it was the only answer i got wrong. but it’s a

4 0
3 years ago
Read 2 more answers
1. Describe your Microsoft word skills that need to be improved upon the most. 2. Explain the Microsoft word skills you are most
Andrei [34K]

Answer:

The answer varies from person to person.

Explanation:

All kinds of people are using Word, so people would recognize if the answer if plagiarized. So, simply answer truthfully; no matter h1ow embarrasing.

7 0
3 years ago
Other questions:
  • Pointsfor a failover cluster, what type of network would you use to communicate with an iscsi device?
    15·1 answer
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    14·2 answers
  • What are the three default security levels within software restriction policies?
    12·1 answer
  • What has information technology made piracy possible?
    14·1 answer
  • What is the best operating system
    12·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Which technology will a business use to figure out who accessed confidential files on a company's computer system
    12·1 answer
  • How to implement switch statement in Python?
    11·2 answers
  • Is TCP really more secure than other L4 protocols by default?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!