1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
8

Ndcdeviceid?????????????????????​

Computers and Technology
1 answer:
butalik [34]3 years ago
7 0

YESS

Explanation:

YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

You might be interested in
You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we
Rasek [7]

Answer:

Check the explanation

Explanation:

The most significant bit is the sign bit (S), with 0 for positive numbers and 1 for negative numbers.

   Normalize significand: 1.0 ? |significand| < 2.0

       Always has a leading pre-binary-point 1 bit, so no need to represent it explicitly (hidden bit)

   The following 9 bits represent exponent (E).(0 TO 511)

       E is : actual exponent + Bias

       Bias = 255;

   The remaining 38 bits represents fraction (F).

Width of representation

smallest value :

   Exponent: 000000001 because 000000000 is reserved

       actual exponent = 1 – 255 = –254

   Fraction: 000…00  \rightarrow significand = 1.0

Kindly check the attached image below to see the concluding solution to the question above.

4 0
3 years ago
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
san4es73 [151]

Answer:

True

Explanation:

High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.

Machine language is the only language that is directly understood by the computer because it is written in binary code. But writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.

7 0
3 years ago
When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
Black_prince [1.1K]
I think that the  insurance coverage amount should be based on the appraisal value of the house. Appraisal value is an evaluation of the value of property based on a given point in time. This evaluation is done by an appraiser who is chosen by the lender.
3 0
3 years ago
Read 2 more answers
Which two statements are true about algorithms?
DENIUS [597]

Answer:

I. Algorithms can be written using pseudocode.

II. Algorithms can be visualized using flowcharts.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

The two statements which are true about algorithms are;

I. Algorithms can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. Algorithms can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

3 0
3 years ago
Read 2 more answers
Other questions:
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • when you cross or enter traffic from a full stop, how much space should you allow on city streets? on the highway?
    11·1 answer
  • You wish to lift a 12,000 lb stone by a vertical distance of 15 ft. Unfortunately, you can only generate a maximum pushing force
    6·1 answer
  • A disadvantage of using an arithmetic mean to summarize a set of data is that __________.
    13·1 answer
  • 1. Use the Storyboard Template.
    11·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    10·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ____
    14·1 answer
  • ❤️❤️Please answer the six questions ✨BRAINIEST✨ For correct answer ❤️❤️
    7·1 answer
  • What does data warehousing allow organizations to achieve?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!