1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
8

Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t

he numbers should be represented in 8 bits. a) 43 b)-43 c)011110
Computers and Technology
1 answer:
asambeis [7]3 years ago
7 0

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

You might be interested in
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
____ [38]

Answer:

Monitor

Power supply

Explanation:

Monitor is the display unit of the computer. It carries capacitors which are charged and helps in electronic display.

Power supply is the unit which converts the AC electric supply to DC supply. It utilizes the capacitors to perform this function

While the hard drive and video card does not contain any capacitors.

4 0
3 years ago
Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
Anna007 [38]

Answer:

a.This helps with non-repudiation to ensure the user is who they claim to be and that they are authorized to access confidential organizational assets.

Explanation:

8 0
3 years ago
Which of the following tasks are suitable for creating an algorithm? Choose all that apply
Hatshy [7]

A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

<h3>What is algorithm?</h3>

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

brainly.com/question/24953880

#SPJ1

8 0
2 years ago
A trojan horse
svp [43]
A trojan horse is software that appears to be benign but does something other than expected.
6 0
3 years ago
Ms Access is spreadsheet software.True or false​
Doss [256]

Answer: I'd say false.

Explanation: An example of a spreadsheet software would be MS Excel. Access does have an option to create a spreadsheet but it also has other uses.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has
    11·1 answer
  • Sniffing network and wireless traffic, intercepting bluetooth traffic, and even using equipment to remotely pull information fro
    12·1 answer
  • Which type of movement lets the player control an object's movement?
    5·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • What pressure will be shown on the high side peessure gauge (ac system on)
    12·1 answer
  • The World Wide Web Click on a Description on the left, then click the Term that best fits the Description. Description Technolog
    5·1 answer
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
  • A. In I/O interation between OS and devices, describe how hybrid mechanism works?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!