1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
6

Reply emailing a student who is asking about audio materials​

Computers and Technology
2 answers:
Sergeeva-Olga [200]3 years ago
4 0

Answer:

The student because you are replying to the student.

Explanation:

Llana [10]3 years ago
4 0

Answer:Free points??

Explanation:

You might be interested in
You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
qwelly [4]

Answer:

Sign Bit = 0 (for Positive number)

Exponent = 111 (Three Bit) calculated in step 5

Mantissa = 1111 11 0 (7 bits for mantissa)

the answer is

<em>sign bit -   Exponent -     Mantissa</em>

The representation of 15.75 in binary in 11 bits is given as

<em>0 - 111 - 1111 11 0</em>

<em></em>

Explanation:

Given data  

15.75 in decimal

calculate it in binary.

1.          

15/2 = 7 (Quotient)   and 1 (remainder)

7/2 = 3 (Quotient)     and 1 (remainder)

3/2 = 1 (Quotient)     and 1 (remainder)

by arranging them in order

<em>15 in decimal = 1111 in binary</em>

<em />

<em>2.</em>

<em />

<em>Now convert 0.75 by dividing 2 , </em>

multiplying = integer + fractional part;

1) 0.75 × 2 =  1.5 = <em><u>1</u></em> + 0.5;

2) 0.5 × 2 = 1= <u><em>1 </em></u>+ 0;

<em>so</em>

<em>0.75 in decimal = 0.11 in binary</em>

<em />

<em>3. </em>Because it is the 15.75 is positive number so we add 0 in extreme right as

<em> 15.75 =  0  1111 . 11</em>

<em>4.  Now making it normalize as by moving point</em>

<em />

0.1111 11 x 2^4

so exponent is 4.

<em />

<em>5. As exponent is 3 bits </em>

exponent + 2^ (No of bits-1) -1

4+ 2 ^ (3-1) - 1 =  4+4 -1 = 8-1 = 7

Now divide 7 by 2

<em>so </em>

7/2 = 3 (Quotient)     and 1 (remainder)

3/2 = 1 (Quotient)     and 1 (remainder)

<em>so exponent in bits is 111</em>

<em>6. Now calculate mantissa</em>

Just remove the point from 0.1111 11 as 1111 11

Now add rest of the bits 0 at right side

mantissa = 1111 11 0

<em />

<em />

<em></em>

8 0
3 years ago
What is wrong with this line of python code
Annette [7]

Answer:

Explanation:

Statement is correct . It will prompt one to enter an number in string format .

The number entered is converted into an integer

3 0
3 years ago
How many votes does a candidate need to become president of the US ?
Goryan [66]

Answer:

270

Explanation:

google mhm because yes the election is going on

6 0
3 years ago
Read 2 more answers
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
guajiro [1.7K]
Cell dosent make sense at all, page also is completely nonsense, fourm also has nothing to do with stored data. Your awnser is C. Record 
3 0
4 years ago
Other questions:
  • If you want to open an application that does not have a tile pinned to the start menu
    9·1 answer
  • Which tab allows you to modify the width of a page margins in Microsoft word?
    7·2 answers
  • Convert the binary (base-2) number 1001 to decimal (base-10).
    9·1 answer
  • Do you believe that technology has indeed flattened the world in terms of providing
    8·1 answer
  • The Occupational Outlook Handbook is published by the Bureau of Labor Statistics.
    10·2 answers
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • Define stubs for the functions get_user_num() and compute_avg(). Each stub should print "FIXME: Finish function_name()" followed
    8·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
  • Which country has the most common features of analogue and digital computer​
    6·1 answer
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!