1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
6

1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?

Computers and Technology
1 answer:
lisabon 2012 [21]3 years ago
8 0

The binary representation of +3997 is 1111 1001 1101.

In one's complement this is simply adding a sign bit and inverting all the bits:

1 0000 0110 0010

The two's complement is the one's complement plus 1:

1 0000 0110 0011

That's 13 bits. Normally the sign bit would be at an 8, 16 or 32,... bit boundary.

For -436 it's 10 0100 1100 and 10 bits


You might be interested in
What is the purpose of a web server? What is the purpose of a web browser?
Sauron [17]

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

4 0
2 years ago
Lets assume we are writing a system to backup a list of transactions: class Transaction 1 String TransactioniD: Date TranactionT
zhannawk [14.2K]

Answer:

The answer is "Option d"

Explanation:

In this question, the easiest way that will save the payment on your database in such a process ID-sorting list would be to mark a payment, that's been recorded mostly on the database whenever this payment became used serial number is not transaction ID, and the wrong choice can be defined as follows:

  • In choice a, It is wrong because it may be processed, however, payments aren't entered through our process, which does not help remove older.
  • In choice b, the unordered list would not enable any transaction to only be retrieved, that's why it is wrong.
  • In choice c, it will not be helpful because the includes video is either begin or complete the payment, it will not be helpful to hold it with transaction time.
  • In choice e, this approach won't help to identify the payments since one date will have a lot of payments over a certain account.
6 0
3 years ago
You configure a Windows laptop for a user who frequently travels and must connect to several wireless networks. While at a new b
aliina [53]

Answer:

Turn on file and printing sharing for all networks.

Explanation:

Windows has several security features when connecting to a network. In the control panel, you can access to Network and internet > Network and sharing center > Advanced sharing options. There you will see 3 different profiles, one for private networks, one for guest or public networks, and one for all networks.

You should take one of the 2 options. Enable file and printer sharing for all networks, so he can just print without doing anything more. Or keeping the print sharing just for private networks, and adding his new branch office's network to the private networks list.

8 0
3 years ago
Por qué es importante modificar la apariencia de un gráfico
Karolina [17]

do you talk English:) could you translate

4 0
2 years ago
Your corporation hosts a Web site at the static public IP address 92.110.30.123.
ladessa [460]

Answer:

Check the explanation

Explanation:

In line with the question, we can now derive that:

The router's outside interface IP address will be 92.110.30.65.

The router's inside interface IP address will be 192.168.11.254.

The Web site's IP public IP address will be 92.110.30.123.

The private IP address of the backup Web server will be 192.168.11.110.

and when we say IP address, it stands for Internet Protocol, it is a set of usual predefined rules which are utilized to administrate the manner to which data packets are sent over the internet. An IP address, which is typically just identified as an IP, is a sequence of figures used to uniquely recognize a computer/device on a particular network or on the internet space.

7 0
3 years ago
Other questions:
  • Which are ways action buttons can be used in presentations?
    11·2 answers
  • Write a program that accepts a number as input, and prints just the decimal portion.
    6·2 answers
  • Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing c
    15·1 answer
  • What are the two main things an operating system does?
    14·1 answer
  • Why you should care about copyright
    13·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    12·1 answer
  • "in troubleshooting a boot problem, what is the advantage of restoring all uefi/bios settings to their default values?"
    13·1 answer
  • Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.
    13·1 answer
  • Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
    6·2 answers
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!