1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
11

Assuming 8-bit 2's complement notation, what is the result of subtracting 00001001 from 00001101?

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
6 0
I think this is how it's done ;)

You might be interested in
You are configuring two switches of different vendors such that they connect to each other via a single link that will carry mul
Jet001 [13]

Answer:

The recommended type of trunk for interoperability is an IEEE 802.1Q trunk.

Explanation:

IEEE 802.1Q is an open industry standard and is the most commonly implemented on layer 2 switches of different vendors, assuring interoperability.

Commonly know as <em>dot1q</em>, is the networking standard that supports virtual LANs (VLANs) on an IEEE 802.3 Ethernet network. It specifies the mechanisms for tagging frames with VLAN data and the procedures for handling this data by switches and bridges.

8 0
3 years ago
Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
omeli [17]

Frank who want to install a software program on a single server with multiple users connected should consider cloud computing. This type of computing delivers convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of configurable computing resources, which is exactly what Frank needs.

3 0
3 years ago
Read 2 more answers
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
2 years ago
Select the correct answer.
juin [17]

Answer:

A. <Title> tag

Explanation:

Required

Tag that can be written in the <head> element

Of the given options, <title> is correct.

This is so because, it is compulsory to have the <title> tag and the only location where it can be placed is inside the <head> tag.

Its function is to display the title of a page

e.g.

<em><title> This is my first page </title></em>

4 0
3 years ago
Need help asapppppppppp
TEA [102]

Answer:

artistic

Explanation:

because being it is considered a art

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a full selector?
    12·1 answer
  • Which of the following has allowed computers to have more memory capabilities without making them extremely expensive Virtual me
    9·1 answer
  • Identical objects are placed in Beaker A and in Beaker B. The objects float as shown in the diagrams below. What can you conclud
    9·1 answer
  • Type 1 hypervisor:
    10·1 answer
  • Do you need internet to play xbox one
    14·1 answer
  • 2.36 LAB: Warm up: Variables, input, and casting (1) Prompt the user to input an integer, a double, a character, and a string, s
    12·1 answer
  • IF YOU PLAY SURVIV&gt;IO WITH ME RIGHT NOW I WILL GIVE YOU BRAINLIEST<br> AND IM NOT KAPPING
    5·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
  • Live footage refers to:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!