1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
11

-(-13) P binary using signed. 2's complement representation

Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
3 0

Answer:

00011101

00011101

Explanation:

Given the following arithmetic operations

a)   (+42) + (-13)

b)   (-42) - (-13)

From (a):

We need to convert +42 into binary, so we get = 00101010

Now for +13, when it is converted into binary, we get = 00001101

But, here, the 13 is negative. So, here is what we will do, we will have to take the two compliment of the binary. After doing that, we get = 111110011

∴

+ 42     →     00101010

<u> - 13      →     1 1 1 10011 </u>

<u>+29             000 11101  </u>

Thus, the arithmetic operation after we use 2's complement is 00011101

b)

Here both 42 and 13 are negative. Using two complement representation

-42 is first converted to binary as 00101010, Then → 11010101 + 1 = 11010110

-13 is converted to binary as 00001101 → 11110010 = 11110011

In between, a negative sign exists, so we take another 2's complement.

i.e.

11110011 → 00001100 + 1 = 00001101

- 42 →     1 1 01 0110

<u>+13  →     00001 101</u>

<u>-29         1 1 1 00011</u>

<u />

since there is no carry, we take two's complements for the result as:

1 1 1 00011 →00011100 + 1 = 00011101

You might be interested in
Examine the following output:
zepelin [54]

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

8 0
3 years ago
A VALENTINE
-Dominant- [34]

Answer:

i dont see the image

Explanation:

6 0
3 years ago
Read 2 more answers
1.) A ____ is a piece of information.
alukav5142 [94]

Answer:

pasensya na Hindi ko alam Ang sasabihin

5 0
3 years ago
Which of the following is not an ideal habitat for a strong time-management plan
Maurinko [17]
The answer to this question is, A. Cramming.


PLEASE MARK BRAINLIEST!! :)
5 0
3 years ago
Read 2 more answers
.Why are protocols important for networking?
NNADVOKAT [17]

Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.

Explanation:

in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.

The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.

besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:

1. static routing protocols

2. dynamic routing protocols.

6 0
3 years ago
Other questions:
  • The four functions of a computer are
    5·1 answer
  • Why might location be important when searching for a job?
    10·2 answers
  • Texture fills are available to add as a slide background true or false
    7·2 answers
  • What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
    10·1 answer
  • .Write a MATLAB script that VECTORIZES (eliminates the loop) the following code. (4points)
    14·1 answer
  • What is ransomware<br>я​
    5·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
    14·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
  • A project manager sets up a recurring invite for meetings using a web-based calendar app on a mobile device. What type of automa
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!