1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
8

Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t

he numbers should be represented in 8 bits. a) 43 b)-43 c)011110
Computers and Technology
1 answer:
asambeis [7]3 years ago
7 0

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

You might be interested in
What is faster C++ or go lang
alukav5142 [94]

Answer:

C++

Explanation:

3 0
3 years ago
Which objects appear on the slide after she clicks ok? Check all that apply.
svp [43]

Answer:

A table with sample values

A chart with sample values

Explanation:

4 0
2 years ago
Read 2 more answers
What type of network is the internet
shtirl [24]

Answer:

The internet is considered as Wide Area Network (WAN).

5 0
3 years ago
What is the output of this program?
dedylja [7]

Answer:

John Rambo is the output

6 0
3 years ago
Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto
k0ka [10]

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

7 0
3 years ago
Other questions:
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    8·1 answer
  • What is one benefit of using electronic sticky notes ?
    9·2 answers
  • Calculate the performance of a processor taking into account stalls due to data cache and instruction cache misses. The data cac
    11·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
    6·1 answer
  • Someone say crackhead
    15·2 answers
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • Fill in the word to complete the sentence.
    10·1 answer
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
  • Summary on how drones can help manage the environment
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!