1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
2 years ago
7

0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8

bits?iii.how did you decide?d.1101 1111 0011 1010 (signed, that is, interpreted as b2t)i.8 bit truncated value:ii.does the value change when truncated to 8 bits?iii.how did you decide?
Computers and Technology
1 answer:
mart [117]2 years ago
4 0
I don't know what b2u and b2t are but I'll manage.

0001 0000 1100 0011 unsigned

i. We'll assume when we' truncate we get the low order bits:

1100 0011 unsigned

ii. Those are different

iii.  There's a 1 in the high order bits that got thrown away when we truncated.

1101 1111 0011 1010 <span>signed </span>

i. Truncated:

0011 1010 

Typically when we'd coerce a signed twos complement value to eight bits we'd preserve the sign.  Calling it truncation makes it sound to me that wasn't intended.

ii. yes, different value

iii. Again, we threw out bits


You might be interested in
Questic
N76 [4]

Answer:

Temporary Data

Explanation:

6 0
2 years ago
Write a program that calculates the total amount of a meal purchased at a restaurant by a customer. The program should ask the u
Illusion [34]

Answer:

Python script is given below

Explanation:

charge = float(input('Enter the amount you were charged. $'))

#setting the formula for tip and tax

tip = charge*.18

tax = charge*.07

#printing the values

print('Charge for the food: %.2f' % charge)

print('The tip amount: %.2f' % tip)

print('Tax amount: %.2f' % tax)

print('Total amount: %.2f' % (charge+tip+tax))

7 0
3 years ago
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
How many transponders are contained within a typical satellite?
Ilia_Sergeevich [38]

Answer:

d.

24 to 32

Explanation:

Satellite programmers broadcast, signals to the satellite which they own or lease the channel space from. Uplinked signals sent by the programmers are received by the transponder located on satellite. It is a device which receives signals and transmits them back to Earth after converting the signals to frequency which could be received by the ground-based antenna. <u>There are typically 24 to 32 transponders on a satellite. </u>

8 0
3 years ago
What do astronomers call a system that is composed of more than two stars?
Nezavi [6.7K]
Nazils system is the anwser
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which social media marketing concept engages visitors, getting them to revisit your website and tying them to offline events for
    7·2 answers
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • A block style business letter is:
    5·1 answer
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • 4. Who developed the first design technology program which had a
    12·1 answer
  • The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the inf
    14·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • Cloud suites are stored on your hard drive and are available anywhere you can access the Internet
    15·1 answer
  • Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d
    14·1 answer
  • Avi does not want to save his internet browsing details on his computer. What should he do?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!