1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
6

Calculate the sum and difference of the given 8-bit unsigned binary numbers. All calculations must be done in binary. Show your

work.
Computers and Technology
1 answer:
Korolek [52]3 years ago
5 0

Answer:

10010101 + 00101110 = 1 1 0 0 0 0 1 1 , 10010101 - 00101110 = 0 1 1 0 0 1 1 1,

01101101 + 01110011   = 1 1 1 0 0 0 0 0 , 01101101 - 01110011 = - 1  1 1 1  1 0 1  0

Explanation:

10010101 + 00101110 =   1 0 0 1 0 1 0 1

                                    + <u>0 0 1 0 1 1 1 0</u>

                                       <u>1 1 0 0 0 0 1 1</u>

In binary, 1 plus 0 is 1, but 1 plus 1 ( which conventionally is two) is divided by 2 and the result is carried-out, while the remainder is used as the answer.

10010101 - 00101110 =   1 0 0 1 0 1 0 1

                                   - <u>0 0 1 0 1 1 1 0</u>

                                     <u>0 1 1 0 0 1 1 1</u>  

Subtraction in Binary calculation, a borrow to a 0 value is equal to two, this law is implemented in a case where 1 is subtracted from 0 ( which is impossible).

01101101 + 01110011   =   0 1 1 0 1 1 0 1

                                   + <u>0 1 1 1 0 0 1  1</u>

                                      <u>1 1 1 0 0 0 0 0</u>

<u />

01101101 - 01110011   =   0 1 1 0 1 1 0 1

                                   - <u>0 1 1 1 0 0 1  1</u>

                                   - <u>1  1 1 1  1 0 1  0</u>

At the end of the subtraction, if the value subtracted from in less than the subtracted number, two is borrowed and the result becomes negative or signed.

You might be interested in
Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
inn [45]

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

5 0
3 years ago
I need help in Jumbotron: Paragraph. The question is:
Aleksandr-060686 [28]
<span>.jumbotron p
{
color: #fff;
font-size: 20px;
}</span>
6 0
3 years ago
Which of the following is the MOST important consideration when planning your budget?
Sladkaya [172]
C.budget for fixed expenses before flexiable expenses 

3 0
3 years ago
Read 2 more answers
Which audio file type was created specifically for use on the Internet?
faltersainse [42]
I believe MP3 like 89% sure
6 0
3 years ago
Read 2 more answers
In this task, you will perform normalization on a crude table so that it could be stored as a relational database.
ryzh [129]

Answer:

Check the explanation

Explanation:

(1.) The functional dependencies based on assumptions are as follows:-

Trip determines which staff was there in the trip, the car used for the trip, the quantity of fuel used in the trip, the fill up time and the total paid of the trip.

Service station refers to its address

Car details consist of the details of license plate, odometer reading and the fuel type used in the car

fuel type and the fill up time will help to determine the cost of the fuel at that time

cost of the fuel and the quantity of fuel used will determine the total paid

From the above assumptions the functional dependencies are as follows:-

Trip ID -> Staff Name, Car Details, Service Station, Quantity, Fill Up Time, Total Paid

Service Station -> Station Address,

Car Details -> License Plate, Odometer reading, Fuel Type

Fuel Type, Fill up Time -> Cost per litre

Cost per Litre, Quantity -> Total Paid

(2.) Initially the relation is as follows:-

R (Trip ID, Staff Name, Car Details, License Plate, Odometer Reading, Service Station, Station Address, Fill up Time, Fuel type, Quantity, Cost per Litre, Total Paid)

For 1 NF there should not be composite attributes,in the above relation Staff Name and Station Address are composite attributes therefore it will be decomposed as follows:-

R (Trip ID, Staff First Name,Staff Last Name, Car Details, License Plate, Odometer Reading, Service Station, Street, City, State, Zip Code, Fill up Time, Fuel type, Quantity, Cost per Litre, Total Paid)

For 2 NF there should not be partial dependency that is non prime attribute should not dependent upon any 1 prime attribute of candidate key, since in the given relation there is only 1 candidate key which is only Trip ID, therefore the relation is already in 2 NF.

For 3 NF there should not be transitive dependency that is non prime attribute should not dependent upon the other non prime attribute, if it is present then the relation will be decomposed into sub relations, the given relation is not in 3 NF therefore it will be decomposed as follows:-

R1 (Trip ID, Staff First Name, Staff Last Name, Car Details, Service Station, Quantity, Fill up time, Total paid)

R2 (Service Station, Street, City, State, Zip Code)

R3 (Car Details, License Plate, Odometer reading, Fuel Type)

R4 (Fuel Type, Fill up Time, Cost per litre)

R5 (Cost per Litre, Quantity, Total Paid)

(3.) After the 3 NF we add the primary and foreign key constraints as follows:-

R1 (Trip ID, Staff First Name, Staff Last Name, Car Details, Service Station, Quantity, Fill up time, Total paid)

R2 (Service Station, Street, City, State, Zip Code)

R3 (Car Details, License Plate, Odometer reading, Fuel Type)

R4 (Fuel Type, Fill up Time, Cost per litre)

R5 (Cost per Litre, Quantity, Total Paid)

In the above relational schema the primary keys are represented with bold and foreign keys by italic

(4.) The ER diagram of the above relational schema using crow's foot notation are as shown in the attached image below:-

5 0
3 years ago
Other questions:
  • Write a C program that has the following statements: int a, b; a = 10; b = a + fun(); printf("With the function call on the righ
    12·1 answer
  • Why are coders using encoder software? What are their advantages and disadvantages? And when might a coder need to use the codin
    12·1 answer
  • What is the purpose of the making of Nintendo Switch?
    10·2 answers
  • Which method can be used to write data to a text file opened with the BufferedWriter object outfile?
    9·1 answer
  • Marys total out of pocket costbwere for the year​
    12·1 answer
  • Each new term in the Fibonacci sequence is generated by adding the previous two terms. By starting with 1 and 2, the first 10 te
    13·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • What does a file association specify?
    10·2 answers
  • Please help
    11·1 answer
  • What should you do if your computer is running slower
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!