1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
3 years ago
5

How many bits are necessary for a binary representation (unsigned) of

Computers and Technology
1 answer:
Musya8 [376]3 years ago
3 0
A. 5
b. as an unsigned int: 9. Normally a year is 365.25 days which would require 32-bits for an IEEE float.
c. 25
You might be interested in
What does modulate your voice mean
alexandr1967 [171]
To modulate your voice is to modify or gain more control of your voice. It basically means to change or adjust the pitch or tone.
7 0
3 years ago
Read 2 more answers
Is it bad to leave external hard drive on for hours
alexandr402 [8]
Yes, because it can cause fires and electrical problems
8 0
3 years ago
What is a principle of DevOps?​
solong [7]

Answer:

the main principles of DevOps are automation, continuous delivery, and fast reaction to feedback. You can find a more detailed explanation of DevOps pillars in the CAMS acronym: Culture represented by human communication, technical processes, and tools.

4 0
3 years ago
E whether True or False.
Natasha_Volkova [10]

Answer:

Learn vocabulary, terms, and more with flashcards, games, and other study ... covers a large geographical area and is made up of many smaller networks. ... you share the cable infrastructure with your neighbors ... do you need if you want to connect two network segments together such as a ... the twists reduce crosstalk.Explanation:

5 0
3 years ago
What is the most common data link layer protocol for a wired connection
krek1111 [17]
I think the answer is The PPP (Point-to-Point Protocol). <em />

It is the most common type of protocol that people use using a modem, a device or a router to have an internet connection. Here there two systems that establish a link to each other which is the point to point. The bits are transferred to a sender and a receiver. 

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which activity uses a feature of a word processor?
    7·2 answers
  • What are the advantages of repeating a header row? check all that apply
    14·1 answer
  • Building relationships during your career exploration is called
    6·1 answer
  • You are troubleshooting a computer that is in the design phase. The problem you see is that the CPU is not receiving information
    14·1 answer
  • Jesse is trying to find a computer file. he types the name of the file into the computer search bar. the computer is most likely
    5·2 answers
  • In Python, arrays are usually reserved for
    12·1 answer
  • Apple's macOS and Microsoft Windows are examples of ________ software. utility application communication operating system
    13·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • A security operation center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices
    15·1 answer
  • What are the advantages of cloud computing over computing on premises?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!