1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
3 years ago
12

The byte-ordering scheme used by computers to store large integers in memory with the high-order byte at the lowest address is c

alled:
a. big endian

b. byte-major

c. little endian

d. byte-minor
Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
4 0

Answer:

a. big endian      

Explanation:

  • Endianness determines the order of how the multiple bytes of information are stored in the memory.
  • Big-endian is a byte ordering scheme in which the most significant byte also called the big end of data is stored at the the lowest address.
  • First byte is the biggest so Big-endian order puts most significant byte first and least significant byte in the last.
  • For example: A hexadecimal number 1D23 required two bytes to be represented so in big endian order this hexadecimal number will be represented as 1D 23.
You might be interested in
. What is automated testing?
shepuryov [24]

Answer: Automated testing is testing of the software by the means of automation by using special tools .These software tools are responsible for the testing of the execution process , functioning and comparing the achieved result with actual result.

It is helps in achieving the accuracy as compared with manual testing and also also function without any human interruption.It produces the test scripts that can be re-used.

8 0
3 years ago
Which of the following code segments does not contain any errors?
Readme [11.4K]

Answer:

c. double triple(float n) { return (3 * n); }

Explanation:

In option a print is used to print integer.While printf is used in C to print something.

In option b there is no * operator between s s s it should be s*s*s.So it will give error.

In option d there is also no multiply operator * in between 3.14 2 r it should be 3.14*2*r.

So we can say that option c is error free.

8 0
2 years ago
Which of the following statements is true about a file stream?
xz_007 [3.2K]

Answer: (c) A file stream object can be used to open more than one file simultaneously.

Explanation: File stream is application that is found on desktop that helps in accessing the files on demand and requirement of the Google Drive. The  files team can access direction and updating takes place automatically.

It also helps in the accessing one or more files in a series through individual file stream object. After all the accessing and activities file gets closed as well and the updates gets save automatically.

Other options are incorrect because accessing the file for reading or writing requires file name mandatory and single object can open a file but cannot be used for writing and reading.Thus ,the correct options are option(c) .

6 0
3 years ago
What is the definition of a server?
elena-14-01-66 [18.8K]

Answer:

A person or thing that provides a service or commodity.

8 0
3 years ago
How should students approach the decision to take the SAT or the ACT?
Vikentia [17]

Answer:

I believe that the only way to really make an informed decision as to which test is a better fit for you is to take a full-length diagnostic exam for both the ACT and the SAT before doing any prep. I also would look at the pros and cons for each test.

I personally took the ACT because there is <em>NO PENALTY </em>for guessing on the test. An educated guess won't hurt your score on the ACT.

6 0
2 years ago
Other questions:
  • What is computer virus?
    8·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • 2 (01.01 LC)
    5·1 answer
  • You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is lis
    13·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • When we code an algorithm, we need to provide the commands in the order we want the
    10·1 answer
  • Who wants brainlyest! NO LINKS how do you message someone on brainly
    10·2 answers
  • A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.
    13·1 answer
  • Where are 'if' and 'else' statements shown when printing a document in a word processor?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!