1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
6

Find the quotient and the remainder of 11010111 ÷ 1010, assuming that the binary numbers are signed integers in two's complement

form.
Computers and Technology
1 answer:
andrew-mc [135]3 years ago
5 0

Answer:

Answered

Explanation:

(11010111)_2= -32+8+2+1 = -21

value of 21 = (010101)_2

(100111)_2= -32+4+2+1= -24

value of 25 = (011001)_2

-21\times -25 = 525

525 = (001000001101)_2

You might be interested in
Hey, how do we get our warnings removed? I got one and I didn't realize that what I did was wrong.
vodka [1.7K]

Sorry we can't remove our warnings

5 0
2 years ago
Read 2 more answers
Is 37 words per minute when typing an okay grade?
Olegator [25]
It is okay but you should be able to type up to 60+ words per minute and keep doing that to practice then if you can get into a typing class.
4 0
3 years ago
Read 2 more answers
What do you observe on the filter paper strip after 2 to 3 hours?
just olya [345]
Is there pictures or anything esle to read in order to figure out the answer

5 0
3 years ago
Read 2 more answers
Pleas help I will give brainiest
stellarik [79]
1) A
2)D
3)C
4)A
5)D
Hope this will help u
5 0
3 years ago
Read 2 more answers
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra
devlian [24]

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

4 0
3 years ago
Other questions:
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • Georgenotfound??? question mark??
    15·2 answers
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Namecoin is an alternative blockchain technology that is used to implement decentralized version of Routing Banking System.A. Tr
    14·1 answer
  • If you have configured your prompt so that it does not show your working directory, you can use the ____ command to verify in wh
    15·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • HELP PLZZZZZZZZ!!!!!!!!!!!
    14·1 answer
  • Que es un vlog? Cual es la diferencia entre vloc y papgina web? ​
    7·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!