1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
4 years ago
12

The byte-ordering scheme used by computers to store large integers in memory with the high-order byte at the lowest address is c

alled:
a. big endian

b. byte-major

c. little endian

d. byte-minor
Computers and Technology
1 answer:
Ostrovityanka [42]4 years ago
4 0

Answer:

a. big endian      

Explanation:

  • Endianness determines the order of how the multiple bytes of information are stored in the memory.
  • Big-endian is a byte ordering scheme in which the most significant byte also called the big end of data is stored at the the lowest address.
  • First byte is the biggest so Big-endian order puts most significant byte first and least significant byte in the last.
  • For example: A hexadecimal number 1D23 required two bytes to be represented so in big endian order this hexadecimal number will be represented as 1D 23.
You might be interested in
material systems developer typically combines the skills of a programmer with the multitasking expectations of a .
SpyIntel [72]

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

The programmer simply does not have to translate the image but he needs to map the objects in some different ways that give it a 3D look. The object is composed of from material instead of simple modeling

8 0
3 years ago
Which elements of a myth appear in this story from early babylon
g100num [7]
-a setting that may be fake
- Supernatural being/character
- Conflict/ the plot of the story
7 0
3 years ago
What is the recommended solution to configure this automated behavior? UC has a requirement that an opportunity should have a fi
Dmitry_Shevchenko [17]
The answer will need to be workflow.
8 0
4 years ago
What does XML do with a data wrapped in the tags?
Arlecino [84]

Answer:

Especificación para diseñar lenguajes de marcado, que permite definir etiquetas personalizadas para descripción y organización de datos. ¿Para que sirve XML? Representar información estructurada en la web (todos documentos), de modo ... Las etiquetas se definen para crear los documentos, no tienen un significado

Explanation:

5 0
3 years ago
The Healthcare Innovation and Technology Lab would most likely be interested in which of the following app types?
prisoha [69]

Answer:

No. 4: An app to send data from an insulin pump to a data collection point.

Explanation:

Healthcare Innovation and Technology Lab would not mainly be focused with budgeting, book reading, and home insurance policies. Answer number 4 includes health and technology.

7 0
3 years ago
Other questions:
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • How are devices connected to each other via Bluetooth? Choose two answers.
    11·1 answer
  • Why process scheduling is needed in a uni-processor system?
    12·1 answer
  • What is an identifier? Give an example of an identifier.
    13·1 answer
  • Python
    5·1 answer
  • What’s the purpose of balancing or monitoring your checking account?
    12·2 answers
  • Adding videos to your website can be tricky because there may be problems making sure they will play in all
    13·1 answer
  • 2.13.4 Colorful Caterpillarhel ????
    15·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
  • 9. Which of the following will best protect your computer from viruses and hackers?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!