1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
12

If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of a

bsolute value) positive and negative integers that can be stored?
Computers and Technology
1 answer:
WITCHER [35]3 years ago
3 0

Answer:

2^63 = 9 223 372 036 854 775 808

Explanation:

Of 64 bits, one is used to store the sign. The rest of 63 bits is used to store the absolute value. The maximum value of n-digit number of base b is b^n.

We are using bits which represent binary (base 2) digits. Base b = 2, digits/bits n = 63. The maximum number is 2^63.

You might be interested in
A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP
Deffense [45]

Answer:

Link-local address

Explanation:

IP addresses that have "FE80" as the hexadecimal representation of their first 10 bits are IPV6 reserved addresses for link-local unicast addressing. These addresses are automatically configured (though may be manually configured too) on any interface and should not be routed. They are used for addressing on a single link with the main aim, among others, of automatic configuration and routing protocol advertisement. Devices attached to this link can be accessed or reached using the link-local addresses as they don't need a global address to communicate.

However, routers will not forward datagram or packets using link-local addresses. In other words, routers are not allowed to connect to the internet using the unicast link-local addresses.

8 0
3 years ago
It is not important to type '=' before a formula or a function
Papessa [141]

Answer:

no

Explanation:

because it designates the sum or total

8 0
2 years ago
With internet access you can send e mail to any computer in the world true or false
Salsk061 [2.6K]

Answer:

true

Explanation:

I think this answers is right

5 0
3 years ago
Read 2 more answers
Which are examples of databases? Check all that apply.
Licemer1 [7]

Answer:

a set of stored information related to banking clients' transactions

Explanation:

7 0
3 years ago
Read 2 more answers
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
Other questions:
  • What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
    14·2 answers
  • A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e
    5·1 answer
  • What your computer can do to you?
    14·2 answers
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • Create a program that prints out a list of all the divisors of a number stored in a variable. (If you don’t know what a divisor
    11·1 answer
  • Can someone help me plz
    13·2 answers
  • What does a for loop look for in the sequence of data? Check all that apply.
    6·2 answers
  • Of the following field which would be the most appropriate for the primary key in a customer information table?
    5·1 answer
  • Each drop-down menu.
    8·1 answer
  • Define a function that will return the length of a list
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!