1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
6

When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?

Computers and Technology
1 answer:
seropon [69]3 years ago
8 0

Explanation:

Using this technique a number is represented in bits by three parts: sign, exponent, and fraction. This is similar to scientific notation used to represent large or small numbers (e.g. ). The sign is negative, the exponent is 8 and the fraction is 0.35.

You might be interested in
Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
SVEN [57.7K]

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

5 0
2 years ago
Transistor was the major technology used during the ____ generation of hardware.
gulaghasi [49]

 

<span>Second generation of computer apparatus. Second Generation: Transistors (1956-1963)</span>

The world would see transistors substitute vacuum tubes in the second generation of computers. The transistor was created at Bell Labs in 1947 but did not see omnipresent use in computers until the late 1950s. 

The transistor enormously higher positioning to the vacuum tube, allowing PCs to transform into littler, speedier, less expensive, more vitality effective and more dependable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to destruction, it was a vast development over the vacuum tube. Second-generation computers still confidence on punched cards for input and printouts for production.

<span> </span>

6 0
3 years ago
Routing and remote access services allow users to connect to private networks using or:.
Luda [366]

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.

8 0
2 years ago
Which of these is a problem that a computer CANNOT solve
harkovskaia [24]
The answer should be C

Getting rid of racism

Hope this helps
8 0
3 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Other questions:
  • The flowchart shape for input or output is an oval. <br> a. True <br> b. False
    6·1 answer
  • Your new home has a vacuum system. what kind of computer is controlling it?
    5·1 answer
  • The word count of the active document is typically displayed on the ________.
    15·1 answer
  • In Excel, an individual cell is the intersection of a row and a column.<br> True<br> False
    10·2 answers
  • alguem por favor poderia me falar que jogo sera mais pesado tanto em qualidades graficas ou em tudo:dragons dogma dark arisen ou
    11·1 answer
  • Suppose a classmate constructed an electric motor with a solid commutator.that is, the commutator has no split. This solid commu
    9·1 answer
  • This is an attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expe
    11·1 answer
  • What can Strings store
    15·2 answers
  • Please help explain this calculator code.
    13·1 answer
  • Amtel University decides to keep a record of their student data in a backup server. The administrator contacts you to identify t
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!