1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
5

A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of

integers can be stored in the computer? if 1’s complement is used? (express your answers in decimal.)
Computers and Technology
1 answer:
iVinArrow [24]3 years ago
5 0
Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

<span>One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive</span>
You might be interested in
19. List three things you can do to protect your online reputation:
finlep [7]
Answer:

- be aware of the online community
- don’t cyber bully
- always be friendly
5 0
3 years ago
How to connect xbox one controller
erma4kov [3.2K]
Hey There! To connect an Xbox controller you click the Xbox logo on the middle of the controller, the button should turn white. Have A Brainly Day :)
3 0
3 years ago
An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
Ulleksa [173]

<u>Explanation</u>:

Remember, the aim of SWOT Analysis is to perform analysis of a phenomenon or case.

Just as in any analysis it is followed by results and recommendations based on the set rules of the analysis.

<u>The Strengths, Weaknesses, Opportunity identified and Threats can translate to the mission statement </u>of a company. It is important to know that this statement is usually factual and accurate.

3 0
3 years ago
____ is the code of acceptable behaviors users should follow while on the internet; that is, it is the conduct expected of indiv
andriy [413]
The Computer Fraud and Abuse Act.
7 0
3 years ago
Test unit 8 edhesive answers ​
True [87]
What are the questions
7 0
3 years ago
Other questions:
  • WILL DO A BRAINLY! help pls.
    15·1 answer
  • Clearing the computer's cache helps store recently-used information.<br><br> True<br> False
    10·2 answers
  • why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
    5·1 answer
  • _______ view focuses on the text and content of a document, without much information on the page layout.
    7·1 answer
  • When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
    7·2 answers
  • Which of the following accessories would you use to create a drawing? A. Calculator B. Notepad C. Paint D. WordPad
    14·2 answers
  • The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
    10·1 answer
  • What is phishing?
    14·1 answer
  • what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
    12·1 answer
  • I have a problem. I can't cycle between game packs on my strike pack, I've watched so many vids I'm on Xböx and I'm holding the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!