1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
10

111+ 11- 1 1111+11111101 +11011010-11​

Computers and Technology
2 answers:
Marat540 [252]3 years ago
8 0

Answer: 121, 2222, 2202, 999

Explanation:

hodyreva [135]3 years ago
8 0

Answer:

a. 121

b. 2222

c. 2202

c. 999

You might be interested in
When creating an excel budget and performing what-if analysis, it is generally easiest to ______.
Rufina [12.5K]

When creating an Excel budget and performing what-if analysis, it is generally easiest to create the budget with a budgeting assumption tab

  • Assumptions in a budget brings about projections by adding one's assumptions to the current data.

  • It is very important to create a budgeting assumptions tab when creating a master budget in microsoft excel because it will simplifies the process of getting how changes to a master budget's main assumptions influences all cornered schedules and the projected financial statements of said firm.

Conclusively we can say that Excel budget and performing what-if analysis produces the budget with a budgeting assumption tab

Learn more from

brainly.com/question/17198039

4 0
2 years ago
There are 5 houses in a row and in 5 different colors.
tankabanditka [31]
What’s the question?
5 0
4 years ago
Categorize each memory card as based on new or old technology. PLEASE HELP.
Leokris [45]

Answer:

SD Cards and XDQ Cards are new XD Cards and CF Cards are old.

Explanation:

Hope this helps.

4 0
3 years ago
How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
vekshin1

Answer:

Following are the solution to this question:

Explanation:

Two tuples were fully identified only with UDP socket.:

< IP address assigned, the port for destination >

Its two tuples have been used in UDP as demux, buttons to identify its UDP socket.

The IP address for the destination:

Its received data is directly provided by the IP address of its port.

Port number of the destination:

The function of the IP address of its port number whenever you obtain a UDP segment would be to control the IP addresses of a segment or send that segment to a port with the same IP address. Its port number for endpoint allows demultiplexing incoming information from its IP.

TCP socket is completely recognized by the following four tuples:

< source IP, port source, IP source, port location >

It tuples are being used to label the sockets by using a demultiplexing (demux) key.

IP address source:

The IP address is being used to identify the unique host that links to. It can assume that perhaps the source IP address shows us all the source Addresses of the sender.

Port number of source:

Its port number amount allows us to identify which section is arriving at which port.

IP address destination:

Its IP address of a destination is the IP address of a port accepting incoming information.

Port number of the destination:

It is port numbers number allows us to identify the facilities or section should be sent to.

Differentiation between TCP and UDP identifier:  

As TCP ports (4 tuples) and UDP ports (2 tuples) are using demux keys to define socks, however, demux keys in UDP are unique from others in TCP for both the following reasons:

TCP uses a separate socket for every contact between both the server and client whereas UDP utilizes its same sockets to process all clients accessed by UDP servers with all communications, it maintains TCP is much more dependable and hence has to hold a different port.

Even so, UDP doesn't accomplish things apart from multicasting and demodulation, but no separate port is necessary by each link. Therefore the TCP socket becomes connection-driven as well as the UDP socket is direct link-free.

5 0
3 years ago
This problem performs elliptic curve encryption/decryption using the scheme out-
USPshnik [31]

Answer:

Following is the solution fr the question step by step:

a. PB = (7,2)

b. Cm = {(8,3), (10,2)}

c. Pm= (10,9)

Explanation:

<h2>I hope it will help you!</h2>

6 0
3 years ago
Other questions:
  • In which of these scenarios would the top 10 option be most helpful
    10·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • Ellen has eggs she wishes to trade for grain. However, she cannot find anyone with grain that needs eggs. What is missing for th
    14·1 answer
  • Microsoft presentation software tool is called
    10·2 answers
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • What's a checked exception?
    14·2 answers
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • What gonna happened if you put rice water in your hair
    8·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • Marc is creating a physical design, what aspect of the design deals with the interaction between a user and data?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!