1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
3 years ago
15

Which of the following bit patterns represents the value -9 in two’s complement notation?

Computers and Technology
1 answer:
nadya68 [22]3 years ago
5 0

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

You might be interested in
Write a method max() which take a generic singly linked list as an argument and returns the maximum element reference in the lis
max2010maxim [7]

Answer:

See explaination

Explanation:

java code:

class DONALD

{

static class Node

{

int data;

Node next;

}

static Node head=null;

static int largestElement(Node head)

{

Int max=Integer.MIN_VALUE;

while(head!=null)

{

if(max<head.data)

max=head.data;

head=head.next;

}

return max;

}

static int smallestElement(Node head)

{

int min=Integer.MAX_VALUE;

while(head!=null)

{

if(min>head.data)

min=head.data;

head=head.next;

}

return min;

}

static void push(int data)

{

Node newNode=new Node();

newNode.data= data;

newNode.next=(head);

(head)=newNode;

}

static void printList(Node head)

{

while(head!=null)

{

System.out.println(head.data + " -> ");

head=head.next;

}

System.out.println("NULL");

}

public static void main(String[] args)

push(15);

push(14);

push(13);

push(22);

push(17);

System.out.println("Linked list is : ");

printList(head);

System.out.println("Maximum element in linked list: ");

System.out.println(largestelement(head));

System.out.print("Maximum element in Linked List: " );

System.out.print(smallestElement(head));

}

}

6 0
3 years ago
Software that translates the sound of human voice into text is called:________.
S_A_V [24]

Answer:

C) speech recognition software.

Explanation:

Software that translates the sound of human voice into text is called a speech recognition software.

In Computer science, a speech recognition software is a voice technology application or program which enables the conversion of human voice such as spoken language to computer commands such as text through the use of speech recognition algorithms.

Some examples of speech recognition software are HTK, Kaldi, Voice navigator, Julius etc.

6 0
3 years ago
The catch clause ________. follows the try clause contains code to gracefully handle the exception type listed in the parameter
Elanso [62]

Answer:

all of these

Explanation:

The catch clause satisfies the following:

1. It starts with the word catch followed by a parameter list in parentheses containing an Exception Type parameter variable.

2. It follows the try clause.

3. It contains code to gracefully handle the exception type listed in the parameter list.

So, option ''all of these'' is correct

6 0
3 years ago
A farmer weighs a dozen chicken eggs.The heaviest is 56 g.​
liubo4ka [24]
I’m sorry but what is the question?
6 0
3 years ago
Which of the following cells can't be recharged
Andrew [12]
The A. Primary cell can not be recharged or the primary cell is not a rechargeable cell. The choices above are the several types of the battery cell which are used for preserving electric energy. There are two major types of the battery cell which are the primary and the secondary cell based on its recharging ability<span>. The other choices besides the primary cell are the secondary cell.</span>
5 0
4 years ago
Other questions:
  • Group technology identifies components by a coding scheme that specifies the
    13·1 answer
  • One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all t
    15·1 answer
  • ___ consists of a central conductor surrounded by a shield (usually a wire braid).
    9·1 answer
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • Match the data-management concepts to their meanings.
    12·1 answer
  • To insert a footnote in a document, a user would navigate to the _____ tab.
    5·2 answers
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • Is the practice of downloading and distributing copyrighted content digitally without permission??
    14·1 answer
  • What is the best memory to be used? Why?
    8·1 answer
  • Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mecha
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!