1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
15

What is the difference between signed and unsigned numbers in binary? Explain 2's complement numbers using a simple example.

Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
7 0

Answer:

Signed numbers represent sign like positive or negative for a number. Unsigned numbers don't store any bit for sign

Explanation:

Signed numbers are the binary numbers where leftmost digit is used to store the sign and the remaining bits used to store the value (magnitude). if leftmost bit of binary number is 0 it is positive number and if it is 1 then it is a negative number

ex: 00110101 represents (+53)

Here 0 (leftmost) represents sign.

Unsigned number is the number which don't have any sign bit. Here only positive numbers we will represent.

ex:0110101(53)

2's complement:  This is used to represent signed numbers. we will get 2's complement by inverting the bits of number and adding 1 to it

0111 1110 for 2's complement first invert the number

1000 0001  after inversion add 1 to it then we will get

010000010

You might be interested in
30 POINTS!!
bulgar [2K]

Answer:

online

the answer is online

7 0
3 years ago
Which command should you use if you want your workbook with a different file name?
klasskru [66]

Answer:

you would right click on the workbook tab you want to change the name on, then you would click Edit Name.

4 0
4 years ago
Whats difference between DCE AND DTE serial interface
harina [27]

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

7 0
3 years ago
The bindery process of cutting irregular shapes and patterns in press sheets is called what?
konstantin123 [22]
B. Die cutting. Typically a metal die with various shapes and patterns is rolled over paper, cardboard, etc to punch out.
3 0
4 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Other questions:
  • What type of hardware enable user to interact with a computer
    15·1 answer
  • How to be cool idk who can awnser this but i know the cleetus can
    13·2 answers
  • Mike wants to build an amplifier. which technology can he use?
    6·1 answer
  • Under what category of programs and apps do screen savers and backup programs fall?
    10·1 answer
  • What is the unit of measure that specifies the value of cellspacing?
    9·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • During side show mode, hitting the B key will do which one of these?
    7·1 answer
  • How am i supposed to add subtitles to a video without have to waist money???
    7·1 answer
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
  • WAp to input the radius and print<br> the area of circle
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!