1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
14

What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between

the quotation marks.) Note: There is space between 1301. Practical (show work 1. What are the sign and magnitude for the following numbers? A. -27 B. 140 C. -99 D. 46
Computers and Technology
1 answer:
Alla [95]3 years ago
7 0

Explanation:

The string "1301" can be converted into numbers by using the ASCII characters set.

1. Decimal ASCII

1=49, 3=51, 0=48, 1=49

Without space

"1301" = 49 51 48 49

with space included

"1 3 0 1" = 49 32 51 32 48 32 49

(white space is represented by 32 in Decimal ASCII)

2. Hexadecimal ASCII

1=31, 3=33, 0=30, 1=31

Without space

"1301" = 31 33 30 31

with space included

"1 3 0 1"= 31 20 33 20 30 20 31

(white space is represented by 20 in hexadecimal ASCII)

The magnitude can be found by traditional decimal to binary conversion (Divide by 2 until we are left with remainder 0 or 1) and sign can be represented by adding most significant bit (MSB) 0 for positive and 1 for negative.

A. -27

Magnitude: 00011011

Since the sign is negative add 1 to the MSB

which becomes 100011011

B. 140

Magnitude: 10001100

Since the sign is positive add 0 to the MSB

which becomes 010001100

C. -99

Magnitude: 01100011

Since the sign is negative add 1 to the MSB

which becomes 101100011

D. 46

Magnitude: 00101110

Since the sign is positive add 0 to the MSB

which becomes 000101110

You might be interested in
Which of the following best describes the purpose of an IP address?
garri49 [273]

IP addresses provide a unique number for identifying devices that send and receive information on the Internet

-scav

8 0
3 years ago
Read 2 more answers
Select all examples of proper keyboarding technique.
krok68 [10]

Answer:

all except keeping your hands higher than your elbows

4 0
2 years ago
What is the name of the app that works like a emp jammer from your iphone app
lions [1.4K]

To my knowledge there is not one if that did somehow occour, it would result in your phone also getting fried by the EMP and render the app useless before it effected anybody else's phone or other devices. hope this answered your question:)

4 0
3 years ago
Order the steps to autofilter data
Lena [83]

Answer:

Select the data you want to filter.

Click Data > Filter.

Click the arrow. ...

Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

Explanation:

1. Select the data you want to filter.

2. Click Data > Filter.

3. Click the arrow. ...

4. Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

3 0
3 years ago
_____ and area calculations are used frequently to estimate costs for maintence and renovation projects
HACTEHA [7]
Could be a variety of things

Budget
Pricing
Resources
Labor
6 0
3 years ago
Other questions:
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • The icons to insert pictures and clip art in the PowerPoint application are located in the _____ grouping on the Insert tab.
    7·1 answer
  • PLEASE HELP!
    13·2 answers
  • What is a quick way to determine if a site might contain reliable information?
    5·2 answers
  • Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
    15·1 answer
  • The primary stream fed by tributaries within a dendritic drainage network is termed a ________ stream
    12·1 answer
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
    6·1 answer
  • Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.
    7·1 answer
  • I like the impact that the increasing number of social grants may have on the things mothers​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!