1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8

bits?iii.how did you decide?d.1101 1111 0011 1010 (signed, that is, interpreted as b2t)i.8 bit truncated value:ii.does the value change when truncated to 8 bits?iii.how did you decide?
Computers and Technology
1 answer:
mart [117]3 years ago
4 0
I don't know what b2u and b2t are but I'll manage.

0001 0000 1100 0011 unsigned

i. We'll assume when we' truncate we get the low order bits:

1100 0011 unsigned

ii. Those are different

iii.  There's a 1 in the high order bits that got thrown away when we truncated.

1101 1111 0011 1010 <span>signed </span>

i. Truncated:

0011 1010 

Typically when we'd coerce a signed twos complement value to eight bits we'd preserve the sign.  Calling it truncation makes it sound to me that wasn't intended.

ii. yes, different value

iii. Again, we threw out bits


You might be interested in
To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access th
krok68 [10]

Answer:

You would temporarily assign it a fixed IP address in the same subnet as the router's default configuration.

Explanation:

If the router doesn't have DHCP enabled yet, your computer will not get an IP address, so you cannot communicate with it.

8 0
3 years ago
What is a fire wall and how does it work
Ostrovityanka [42]

Answer:

a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules

8 0
3 years ago
The 3 parts of the CPU are
katrin2010 [14]

Central Processing Unit

Arithmitic Logic Unit

Control Unit


3 0
4 years ago
Read 2 more answers
Suppose that you have the following definitions:
spin [16.1K]

Suppose that you have the following definitions:struct time Type struct tourTypen the variable destination of type your type are tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.city name;

<h3>What is C++ statements?</h3>

Expression statements. These statements examine an expression for its aspect outcomes or for its go-back value. Null statements. These statements may be supplied in which a declaration is needed with the aid of using the C++ syntax however in which no motion is to be taken.

  1. #include
  2. #include
  3. the use of namespace std;
  4. struct timeType
  5. ;
  6. struct tourType
  7. ;
  8. tourType destination;
  9. tourType input(){
  10. cout<<"Enter the city, distance and time in hr and min"<>destination.cityName;
  11. cin>>destination.distance;
  12. cin>>destination.travelTime.hr;
  13. cin>>destination.travelTime.min;
  14. go back destination;
  15. }
  16. void display()cityName;
  17. d.distance = t->distance;
  18. d.travelTime.hr = t->travelTime.hr;
  19. d.travelTime.min = t->travelTime.min;">
  20. int main().

Read more about the variable :

brainly.com/question/2804470

#SPJ1

6 0
2 years ago
What does the third argument (3) refer to in the following formula: VLOOKUP(10005, A1:C6, 3, FALSE)
zzz [600]

Answer:

The answer is "number of the column containing the return value".

Explanation:

In Excel, the "VLOOKUP" method is used to perform the vertical search by looking for both the value during the user table and retrieving the number of the index number location in the same row. It is a built-in function, which is classified as a Lookup or Reference worksheet function, and the following function can be defined as follows:

  • In the 1st parameter, it is used to watch the value for the match.  
  • In the 2nd parameter, it is used to search the table.
  • In the 3rd parameter, it is used as the column number representing the return value.  
  • In the 4th parameter, it is used to return only if the same match is found.
5 0
3 years ago
Other questions:
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Which of the following BEST describes an extranet?
    13·1 answer
  • The File method lastModified() returns
    10·1 answer
  • All health information available on the internet is valid. <br> a. true <br> b. false
    6·1 answer
  • Hello. I have an app which doesn't let me get in. It says: "wrong app info". I'm in a samsung device. How can I solve that probl
    13·2 answers
  • What does running the “sudo” command do?
    6·1 answer
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • How to shutdow computer
    7·1 answer
  • Which statements accurately describe the Outlook interface? Check all that apply.
    7·1 answer
  • What are some legal issues that can arise from the use of social media?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!