1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
11

Assuming 8-bit 2's complement notation, what is the result of subtracting 00001001 from 00001101?

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
6 0
I think this is how it's done ;)

You might be interested in
You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
san4es73 [151]

Answer:

1. You can invoke or call a method from another program or method: TRUE

2. When methods must share data, you can pass the data into and return the data out of methods: TRUE

3. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant: TRUE

Explanation:

4 0
3 years ago
true or false: the larger your sample size for a survey, the more likely it is that you will draw false conclusions from your in
Alex_Xolod [135]
False. The more people you have the more likely you will have true conclusions...
6 0
3 years ago
What is an advantage of unicode over ascii?
tamaranim1 [39]
Unicode is a 16 bit system which can support 65636 different characters which is much more than the number of characters that ASCII code support.
7 0
3 years ago
7.4.4: Length of User's Name
Natalija [7]

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

6 0
2 years ago
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
inessss [21]
Cyberbullying overlaps with discriminatory harassment
7 0
3 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
    7·1 answer
  • When you begin typing text, the _________________________ appears on the status bar with an animated pencil writing on paper tha
    15·1 answer
  • Data is: a. Information endowed with relevance and purpose b. Set of specific objective facts or observations c. Some informatio
    10·1 answer
  • What happens if you move unencrypted files into an encrypted folder?
    5·1 answer
  • Which of the following statements best deceive the relationship between carrying capacity and population size
    12·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • In 3-5 sentences, describe how you would insert a graph in your word-processing document.
    13·1 answer
  • "A user reports that the corporate web server cannot be accessed. A technician verifies that the web server can be accessed by i
    8·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!