1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
11

Convert each of the following 8-bit 2's-complement numbers to decimal form. (16 points) a) 01001000 b) 01010101 c) 10101010

Computers and Technology
2 answers:
kherson [118]3 years ago
7 0

Answer:

a) 72

b) 85

c) -86

Explanation:

A 2's-complement numbers is converted to decimal form by multiplying each instance of 1 by 2^(position -1) and adding the sub-results.

a) 01001000 =>

1* 2^(7-1) + 1*2^(4-1) = 64+8 = 72

b) 01010101 =>

1* 2^(7-1) + 1*2^(5-1) + 1*2^(3-1) + 1*2^(1-1) = 64+16+4+1 = 85

c) 10101010

1's complement of the given number by bit inversion is 01010101

2's complement is obtained by adding 1 to the 1's complement.

=01010110

In decimal this is : 1*2^(7-1)+1*2^(5-1)+1*2^(3-1)+1*2^(2-1) = 64+16+4+2 = 86

So the original number is negative of this = -86

Tju [1.3M]3 years ago
4 0

Answer:hsgshh

Explanation:

You might be interested in
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Mnenie [13.5K]

Answer:

False

Explanation:

Targeted attacks are usually harder because if someone has a password that is 1234 and you try it on 100 computers, you most likely will get someones password. If you are targetting a select computer with a strong password it is much harder to brute force or guess.

8 0
4 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
4 years ago
Lean production systems are sometimes referred to as pull systems because demand from customers activates the production actions
fredd [130]

Answer:

a.Kanban Pull System

Explanation:

Part of a lean manufacturing technique, is the pull system and it is a production or service oriented process used to reduce waste. A pull system is a Lean technique for reducing the waste of any production process. Using a pull system allows you to begin new work only when there is either customer demand for it or goods are required by the next step within the production process. Applying a pull system allows you to start new work only when there is a customer demand for it. This gives you the opportunity to reduce overhead and optimize storage costs.

Kanban is based on a set of principles and practices that are easy to understand. Implementing them is also fairly simple since you do not need to make any serious changes to your existing process. But it is key that you understand the methodology and stick with the core practices if you want to successfully implement a Kanban pull system.

7 0
4 years ago
Read 2 more answers
The ____________________________________ transferred to FEMA all functions of the Preparedness Directorate, including the Office
vagabundo [1.1K]

Answer:

2006 Post-Katrina Emergency Management Reform Act.

Explanation:

After the hurricane Katrina hit United states which affected more than half a million people there were various shortcomings in the  preparation and response authorities.So this act also called 2006 post katrina Act came which transferred all the functions to FEMA(Federal Emergency Management Agency).

7 0
4 years ago
you have an ipv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement
Soloha48 [4]

Answer:

Teredo tunnelling

Explanation:

The tunnelling method that will fit best in the situation is teredo tunnelling. The reason are embedded in its characteristics, they include;

Teredo tunneling has the following characteristics: Its tunnel endpoints are configured on hosts. The hosts are dual stack hosts and perform tunneling of ipv6 to send on the ipv4 network works through NAT the only solution that allows ipv4-only hosts to communicate with ipv6-only hosts is NAT-PT.

7 0
3 years ago
Other questions:
  • Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
    15·1 answer
  • If you attempt an edgeunity quiz is your latest attempt the one counted?
    10·1 answer
  • What are the two ways to use the help menu
    9·2 answers
  • Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a
    15·1 answer
  • Optimal page replacement ______.A. is the page-replacement algorithm most often implementedB. is used mostly for comparison with
    12·1 answer
  • Following the car in front of you at a closer distance _____.
    6·2 answers
  • Hjnjjjhhbbfg66ui998876dch
    8·1 answer
  • Ok can someone tell me why I can’t do this? I’m trying to put a video as my background but it won’t show up when I go to add vid
    13·1 answer
  • Rachel wants to minimize project risks. Arrange the steps in an order that will correctly help Rachel and her team to minimize p
    13·2 answers
  • Write a program to prompt the user for hours worked to compute a gross pay for an employee, and he is paid 100/hour. If he worke
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!