1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
7

0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8

bits?iii.how did you decide?d.1101 1111 0011 1010 (signed, that is, interpreted as b2t)i.8 bit truncated value:ii.does the value change when truncated to 8 bits?iii.how did you decide?
Computers and Technology
1 answer:
mart [117]3 years ago
4 0
I don't know what b2u and b2t are but I'll manage.

0001 0000 1100 0011 unsigned

i. We'll assume when we' truncate we get the low order bits:

1100 0011 unsigned

ii. Those are different

iii.  There's a 1 in the high order bits that got thrown away when we truncated.

1101 1111 0011 1010 <span>signed </span>

i. Truncated:

0011 1010 

Typically when we'd coerce a signed twos complement value to eight bits we'd preserve the sign.  Calling it truncation makes it sound to me that wasn't intended.

ii. yes, different value

iii. Again, we threw out bits


You might be interested in
1. A cell is identified by its ........
earnstyle [38]
Answers:
1- cell address ( i think)
5 0
2 years ago
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
3 years ago
What does PR stand for ?
ss7ja [257]

Answer:

Public Relations or Pull Request (computer programming)

Explanation:

Hope this helps

3 0
2 years ago
Write a program that reads three numbers and prints "increasing" if they are in increasing order, "decreasing" if they are in de
Lemur [1.5K]
You could assign values to variables and break it up into if else-if else statements.

<span>Pseudocode:</span>

if a < b and b < c:
    print("increasing")

else if a > b and b > c:
    print("decreasing")

else:
    print("neither")

Hope this helps.
7 0
3 years ago
If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
RideAnS [48]

parents

childline

ceop

family

3 0
3 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • How do you read a column
    8·1 answer
  • If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
    6·2 answers
  • You have just driven to the Hewlett-Packard site in Corvallis to field-interview a programmer. You sit down in a conference room
    6·1 answer
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    12·1 answer
  • Ten examples of an interpreter
    8·1 answer
  • Define the terms of data and information .​
    6·1 answer
  • Identify and explain groups that may be impacted by nanotechnology.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!