1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
5

A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of

integers can be stored in the computer? if 1’s complement is used? (express your answers in decimal.)
Computers and Technology
1 answer:
iVinArrow [24]3 years ago
5 0
Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

<span>One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive</span>
You might be interested in
A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
evablogger [386]

Answer:

OKKKkkkkkkayyyy

3 0
3 years ago
You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
olganol [36]

Answer:

Check the hardware switch on the wireless antenna card that activates the service.

Explanation:

The person works for uCertify Inc as an IT Technician. David, a regular, has just buy a laptop. He still says that he will not link to a wireless connection, although his laptop seems to have an inner wireless app. So, by checking the hardware switch on the wireless antenna card that activates the service, that person resolves the issue.

7 0
3 years ago
HEY DO U LIKE TRAINS!
Triss [41]

Answer:

yes

Explanation:

yes

3 0
4 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Which of the following is not true about primitive data types.
SVEN [57.7K]

Answer:

The point 2 is incorrect as Primiticve data types are immutable

Explanation:

3 0
3 years ago
Other questions:
  • Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
    7·1 answer
  • Which of the following should be the first page of a report?
    11·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • Which code will allow Jean to print Coding rocks! on the screen?
    6·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • A.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​
    12·1 answer
  • What is destination email address​
    8·1 answer
  • Select the correct answer.
    11·2 answers
  • How do i copy a canvas course from old class to new course.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!