1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
7

Add the following UNSIGNED, byte-sized (8 bits) numbers 10010011 01101110

Computers and Technology
1 answer:
klemol [59]3 years ago
6 0
<h2>Answer:</h2>

<u>1 </u> 0  0  0  0  0  0   0   1

An overflow occurs if the result is stored in an 8-bit memory.

The actual result will be

0  0  0  0  0  0   0   1

<h2>Explanation:</h2>

  1   0  0  1   0  0   1   1

<u>+ 0   1   1  0   1   1    1   0</u>

<u>1  0  0  0  0  0  0   0   1</u>

<u />

<u>Steps:</u>

i. Arrange the numbers such that the most significant bits and least significant bits of each number are directly positioned one above the other.

ii. Add bitwise starting from the rightmost bit.

<u>Result:</u>

The result from adding these two numbers is

<u>1 </u> 0  0  0  0  0  0   0   1

This is a 9-bit number, that means there is an overflow since the addition is done with 8 bits numbers and likely stored in an 8-bit storage. The leftmost bit (which is underlined above) is the overflow bit. Therefore the actual result will be

0  0  0  0  0  0   0   1

You might be interested in
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosp
Zigmanuir [339]

Answer:

competitive

Explanation:

An inhibitor is a substance that hinders the action of an enzyme. An inhibitor may be competitive or non competitive.

A competitive inhibitor is an inhibitor that is very similar to the substrate hence it binds to the enzyme instead of the substrate. A noncompetitive inhibitor binds to a site that is different from the active site. This site is called an allosteric site.

If we look at the experiment described in the question, the reaction rate decreases upon addition of the inhibitor. This effect is reversed by adding a large quantity of substrate.

The implication of this observation is that the enzyme and the inhibitor compete for the active site on the substrate.

Hence the inhibitor is a competitive inhibitor.

7 0
3 years ago
Answer this correct and get brainly
Leya [2.2K]

Pseudocode:

import random

fetch user input on a lucky number

insert input into variable - "response"

new variable, random = randint

condition to check wheather random is our response

display results

Python Code:

import random

def main():

response = int(input("Guess my lucky number, its between 1 and 100: "))

lucky_number = random.randint(1,100)

if response == lucky_number:

print(f"Wow you're right, it is {lucky_number}")

else:

print("Sorry, Try Again")

main()

Reminder:

intended for python3 as i included the format f

also it could be done without the import, just manually insert a number

i'll leave the post mortum to you

5 0
3 years ago
Read 2 more answers
Can someone write an essay on data storage and describe the different storages I have listed below•
Jobisdone [24]

Answer:

Explanation:

Punch card is the oldest computer storage; followed by tape and then floppy disk. Hard drive goes back as far as floppy but is still in use today. CD/DVD/BR discs are all later storage but are also used for storing music and videos. USB flash, SD card, SSD and cloud storage are the common technologies used today for data storage.

4 0
3 years ago
Read 2 more answers
Assume the following JavaScript program was interpreted using staticscoping rules. What value of x is displayed in function sub1
Annette [7]

Answer:

Static scoping: x is 5

Dynamic scoping : x is 10.

Explanation:

Static scoping :

In static scoping the variable of a function take the value within the function.

If there is no values exist within the function then take the global value of the variable.

var x // No value is assigned to x so it check global value of x

function sub1() {

   document.write(“x = “ + x + “”); // So it print x = 5

}

function sub2() {

   var x;

   x = 10;

   sub1();

}

x = 5; // It is the global value of x

sub2();

Static scoping: x is 5

Dynamic scoping :

In Dynamic scoping the variable of a function take the value all the calling function ends.

If the global value is the last assigned value of a variable then it take that value.

If there exist some other function after global variable value if that function contain the variable with some assigned value variable take that value.

var x

function sub1() {

   document.write(“x = “ + x + “”);

}

x = 5; // At this point x value is 5 and check there exist a function

sub2(); // So now call this function

function sub2() {

   var x;

   x = 10; // The value of x = 5 is replaced with x = 10

   sub1();

}

Dynamic scoping : x is 10.

7 0
3 years ago
Other questions:
  • create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.
    11·2 answers
  • a certain battery can supply 6 J of energy to every coulomb of charge moving through a circuit. if the circuit consists of two i
    13·1 answer
  • One cost of starting your own business is _____.
    12·1 answer
  • Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
    8·1 answer
  • Employees at the Red Bluff Golf Club &amp; Pro Shop have the opportunity to become certified trainers if they log enough hours.
    13·1 answer
  • Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
    6·2 answers
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
  • True or False: Variablename must start with a number.
    13·1 answer
  • Can you sue someone in brainly? How is this not relate to education?
    5·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!