1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
12

4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,

for example, can be written (2 * 2 * 2 + 1) * 6, we can calculate 9 *6 by shifting 6 to the left 3 times and then adding 6 to that result. Show the best way to calculate 13 * 7 using shifts and adds/subtracts. Assume both inputs are 8-bit unsigned integers.
Computers and Technology
1 answer:
pychu [463]3 years ago
3 0

Answer:

Check the explanation

Explanation:

The above question can be sovled in the below step by step way:

15 can be written as 16-1 = 24 -1

Therefore, 15 *13 = (24 -1)*13

= 13*24 - 13

Now, when we left shift a number we multiply it by 2k .Where k is no of times we left shifted it.

Therefore, 13*24 = shift 13 to left 4 times

15 * 13 = shift 13 to left 4 times and subtract 13 from it.

You might be interested in
Which two benefits can be expected from KCS adoption if universal Containers wants to implement best practices for its customer
drek231 [11]

Answer:

B. A knowledge article life cycle that evolves based on usage and demand.

Explanation:

As new information is gathered on the product and the type of issues that customers encounters, the knowledge article can be updated to inform the customer on how to handle their problem.

3 0
4 years ago
Briefly explain the technology used for fifth generation computers​
lisov135 [29]

Answer:

Fifth Generation is 1980 to date. VLSI (Very Large Scale Integration) Technology became ULSI (Ultra Large Scale Integration) technology resulting in the production of microprocessor chips having ten million electronic components. Fifth Generation is based on parallel processing hardware and Artificial Intelligence.  

Explanation:

3 0
3 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
Arisa [49]
It could fail, it would take a long time setting it up and aslo it could be easily hacked.
3 0
3 years ago
True or False? Inserting special characters in a document can be completed using the Ribbon or a keyboard shortcut.
lina2011 [118]
True. hope this helps!
5 0
3 years ago
Other questions:
  • Helpppppp pleaseeeeeee
    5·1 answer
  • A database with a(n) _______________ data structure can easily handle a many-to-many data relationship. hierarchical network rel
    5·1 answer
  • What is the primary purpose for a screen saver in windows?
    8·1 answer
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • In order to create strong neural networks (connections) in your brain, you've got to __________ the learning process.
    14·1 answer
  • Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c
    14·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    12·1 answer
  • Why do we use computers?<br><br>​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!