1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
3 years ago
6

What is the imitation of representing numbers with fixed point representation?

Computers and Technology
1 answer:
Tanzania [10]3 years ago
4 0

Answer:

Hello your question is not complete, The complete question is ; <em>what is the Limitation of representing numbers with fixed point representation</em>

answer:  Limited range of values that can be represented

Explanation:

The limitation of representing numbers with fixed point representation is that there is a Limited range of values that can be represented using this method of representation

Fixed point  representation is a type of representation whereby there is a  fixed number of bits for both integer parts and fractional part.

You might be interested in
Explain drawing and painting package.​
Murljashka [212]
Enhances drawing experiences, adds more features and adds better quality

8 0
3 years ago
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
4 years ago
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
ki77a [65]

Answer:

SSD

Explanation:

8 0
2 years ago
Help please not trying to fail
deff fn [24]

Answer:

B. Everywhere CFCI is not

8 0
3 years ago
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • A variation of pronounce is a. Proclaim c. Produce b. Profound d. Pronunciation Please select the best answer from the choices p
    11·1 answer
  • Free 100 point to first to answer
    5·2 answers
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Why was the IPv6 address format created? Select one:
    12·1 answer
  • Iciples UI
    12·1 answer
  • Lab 6B: printing a binary number
    13·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!