1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
11

You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math

using 40 separate characters (probably because there are 40 stripes on a zebra). They would very much like to use computers, but would need a computer to do Zebronian math, which would mean a computer that could represent all 40 characters. You are a computer designer and decide to help them. You decide the best thing is to use BCZ, Binary Coded Zebronian (which is like BCD except it codes Zebronian, not Decimal). How many bits will you need to represent each character if you want to use the minimum number of bits
Computers and Technology
1 answer:
marshall27 [118]3 years ago
6 0

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

You might be interested in
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation onc
Dmitriy789 [7]

Answer:

10 minutes

Explanation:

3 0
3 years ago
What can be found in the computer tower
8_murik_8 [283]
There are several things.
Some which include of
<span>Hard Disk Drive (HDD)
</span><span>Processor (CPU)
</span><span>Graphics card
</span>and
<span>Memory (RAM)</span>
8 0
3 years ago
Assignment RequirementsYou have been working as a technology associate in the information systems department at Corporation Tech
garik1379 [7]

Answer:

hola me llamos por mi nombre

Explanation:

me gusta la tegnologia

y no e trabajado xq soy estudiamte aun

7 0
3 years ago
Making phone calls with a public box
AfilCa [17]

Answer:

ja ok it is so eassssy.........................

8 0
3 years ago
Jenny wants to create a network that can be accessed from any room in her house without physically connecting. Which type of net
CaHeK987 [17]

Answer:

D. Wireless

Explanation:

Jenny should opt for the wireless method out of all choices. This is be cause wireless network enables the user to access and use the network from anywhere in radius to the network without a physical connection.

6 0
2 years ago
Other questions:
  • An effectively distributed resume will get an interview
    12·2 answers
  • You need to prevent the use of tftp through your firewall. which port would you block?
    9·1 answer
  • This exercise asks you to write a program that tests some of the built-in subroutines for working with Strings. The program shou
    12·1 answer
  • What are 2 plants that grow best in our soil type ​
    9·1 answer
  • What are the functions of online gaming communities?
    12·1 answer
  • Match each career with the education required for each job
    12·1 answer
  • Bert started off his working life as a typesetter for a print house. With the advent of new technologies, Bert's job became redu
    6·1 answer
  • Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method
    8·1 answer
  • An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data elemen
    7·1 answer
  • Changing how information is represented so that it can be read by a computer is called
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!