1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
2 years ago
8

Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t

he numbers should be represented in 8 bits. a) 43 b)-43 c)011110
Computers and Technology
1 answer:
asambeis [7]2 years ago
7 0

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

You might be interested in
The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
marta [7]

Answer:.......

void clear(int *array, int length){

 

  if (length == 0)return;  

 

  array[0] = 0;  

 

  clear(array + 1, length-1);

}

Explanation:

The void function accepts an integer array.

7 0
3 years ago
What is the reason of non-deterministic (indeterminate) behavior of concurrent programs?
murzikaleks [220]

Answer: Concurrent programs are the programs that execute at the same point of time. They are simultaneous in nature with other concurrent programs.They are executed with the help of threads  to achieve the concurrency without the issue of scheduling. They are consider long running programs.

The program that has the low execution time compared with all other programs gets executed first.If the case of no progress is seen then another thread is executed.This type of execution gives the non- deterministic situation in which the possibility of leading completion of any particular program cannot be determined.

5 0
2 years ago
How to check if students viewed an assignment canvas.
Greeley [361]
Which app are you using?
6 0
2 years ago
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Complete the sentence.<br><br> A ___________search can be done on a list that is not ordered.
adelina 88 [10]

Answer:

Well, a binary search has to be ordered. So ima just say linear search..

Explanation:

I think its linear..

3 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Give two examples of non printing characters
    6·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • A star appears under the <br> menu of the word processing program.
    5·1 answer
  • Free 100 point to first to answer
    5·2 answers
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • Convert (65.125)10 to octal.
    7·1 answer
  • Create and test a user-defined function named ufnFullName that combines the values of the two parameters named FirstName and Las
    15·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
  • Which of the following is NOT a method for applying the SDLC model?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!