1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
6

If we use 6 bits for representing positive and negative numbers using 2's

Computers and Technology
2 answers:
nadya68 [22]3 years ago
6 0
Answer:

-4


Explanation:
In binary, 11100 is 28
But in the two’s complement method, it will equals = (-4).
the last number always represents negative number.
In other words, if this (101010) with 6 digits. Without using two’s complement method, it would be 42 in binary. But with two’s complement method, it would ( - 22)


I hope this helps. Please don’t hesitate to ask if u concerning my answer
erastova [34]3 years ago
6 0
Yeeeeeeeeeeeeeeeeeeeeeeee
You might be interested in
Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
ycow [4]
Here i found this link that might help!
https://study.com/academy/lesson/the-differences-between-fuses-circuit-breakers.html

Have a nice day!
3 0
4 years ago
Recall that the name of a transport-layer packet is segment and that the name of a link-layer packet is frame. What is the name
AlladinOne [14]

Answer:

A network-layer packet is a data gram. A router forwards a packet based on the packet's IP (layer 3) address. A link-layer switch forwards a packet based on the packet's MAC (layer 2) address.

Explanation:

When the end system receives the unstructured bit stream from the physical wire, each layer removes the header information applicable to it until the application receives the data.

1. An application, such as an email program, creates data that will be sent by an end user, such as an email message. The Application layer places a header (encapsulation) field that contains information such as screen size and fonts, and passes the data to the Presentation layer.

2. The Presentation layer places layer 6 header information. For example, the text in the message might be converted to ASCII. The Presentation layer will then pass the new data to the Session layer (layer 5).

3. The Session layer follows the same process by adding layer 5 header information, such as information that the Session layer will manage the data flow, and passes this data to the Transport layer (layer 4).

4. The Transport layer places layer 4 information, such as an acknowledgement that the segment was received in the header, and passes it to the Network layer (layer 3).

5. The Network layer places layer 3 header information, such as the source and destination address so the Network layer can determine the best delivery path for the packets, and passes this data to the Data Link layer (layer 2).

6. The Data Link layer places layer 2 header and trailer information, such as a Frame Check Sequence (FCS) to ensure that the information is not corrupt, and passes this new data to the Physical layer (layer 1) for transmission across the media.

7. The bit stream is then transmitted as ones and zeros on the Physical layer. It is at this point that the Physical layer ensures bit synchronisation. Bit synchronisation will ensure the end user data is assembled in the correct order it was sent.

8. Steps 1 through 7 occur in reverse order on the destination device. Device B collects the raw bits from the physical wire and passes them up the

Data Link layer. The Data Link layer removes the headers and trailers and passes the remaining information to the Network layer and so forth until data is received by the Application layer. Eventually, Device B will receive an email notification displaying a message to indicate that a new email message has been received.

5 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Write an algorithm that asks a user to enter a number between 1 and 10. (This range includes the numbers 1 and 10.) When they en
Nataliya [291]

Answer:

do{

   cout<<"Introduce number \n"; //print the message

   cin>>num; //set the value of the number given

}while(num<1 || num>10); //repeat while the number is out of the range

cout<<"Number: "<<num; //print the number

Explanation:

The idea behind this code is to create a loop in which I can compare the number given  (between 1 and 10) and then print the number or get back and ask the number again.

#include <iostream>

using namespace std;

int main()

{

   int num; //create num variable

do

{

   cout<<"Introduce number \n"; //print the message

   cin>>num; //set the value of the number given

}while(num<1 || num>10); //repeat while the number is out of the range

cout<<"Number: "<<num; //print the number

}

4 0
3 years ago
True or False:
Fudgin [204]

Answer:

False

Explanation:

Input/output devices do NOT transfer information in only one direction.

Input devices receives the information while the output devices sends the information. The direction of the information being transferred between the input and output is NOT just in one direction.

Examples of input devices are keyboard, mouse, joy stick, scanner, etc.,

Examples of output devices are monitor (LED, LCD, CRT etc), printers (all types), plotters, projector, speaker(s), head phone, etc.

7 0
3 years ago
Other questions:
  • Vannevar bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    10·1 answer
  • Hw to gain more knowledge ​
    6·1 answer
  • after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
    13·1 answer
  • What is the most likely result of making a plan for life after high school
    14·1 answer
  • Compound conditions require a computer to sense whether multiple conditions are true or false.
    9·1 answer
  • What single awk command can be used to display all the login names and their associated numerical user IDs
    14·1 answer
  • Cuántos tipos de grua existen en el mundo​
    7·1 answer
  • HELP PLZZZZZZ
    10·1 answer
  • Davids family took him to a hospital as he was suffering from a sericous ailment
    8·1 answer
  • How to implement switch statement in Python?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!