I think the best one is voice recognition keyboards.
Would perfect work there
Mark as brainliest
Answer:
Let's convert the decimals into signed 8-bit binary numbers.
As we need to find the 8-bit magnitude, so write the powers at each bit.
<u>Sign -bit</u> <u>64</u> <u>32</u> <u>16</u> <u>8</u> <u>4</u> <u>2</u> <u>1</u>
+25 - 0 0 0 1 1 0 0 1
+120- 0 1 1 1 1 0 0 0
+82 - 0 1 0 1 0 0 1 0
-42 - 1 0 1 0 1 0 1 0
-111 - 1 1 1 0 1 1 1 1
One’s Complements:
+25 (00011001) – 11100110
+120(01111000) - 10000111
+82(01010010) - 10101101
-42(10101010) - 01010101
-111(11101111)- 00010000
Two’s Complements:
+25 (00011001) – 11100110+1 = 11100111
+120(01111000) – 10000111+1 = 10001000
+82(01010010) – 10101101+1= 10101110
-42(10101010) – 01010101+1= 01010110
-111(11101111)- 00010000+1= 00010001
Explanation:
To find the 8-bit signed magnitude follow this process:
For +120
- put 0 at Sign-bit as there is plus sign before 120.
- Put 1 at the largest power of 2 near to 120 and less than 120, so put 1 at 64.
- Subtract 64 from 120, i.e. 120-64 = 56.
- Then put 1 at 32, as it is the nearest power of 2 of 56. Then 56-32=24.
- Then put 1 at 16 and 24-16 = 8.
- Now put 1 at 8. 8-8 = 0, so put 0 at all rest places.
To find one’s complement of a number 00011001, find 11111111 – 00011001 or put 0 in place each 1 and 1 in place of each 0., i.e., 11100110.
Now to find Two’s complement of a number, just do binary addition of the number with 1.
Answer:
Option a
Explanation:
The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.
Therefore, options b, c, d and e can't be true because:
b. Activities in the Critical Path Method has no or zero slack.
c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.
d. The CPM method schedules the activity of the longest duration.
Answer:
Option (B) is the correct of this question.
Explanation:
The performance of a monitor and process counters to observe the performance is the tool or method which determines the new software is hogging the computer resources. So this way the user don't have any problem with computer.
- You can view log files in Windows Performance Monitor to see a visual representation of the performance counter data.
- Performance counters are bits of code that log, count, and measure software events that allow a high-level view of user trends.
- To customize the tracking of AD FS output using the Quality Monitor.
- Type Output Monitor on Start screen, then click ENTER.
- Expand Data Collector Sets in the console tree, right-click on User Specified, point to New, then select Data Collector Collection.
Other options are incorrect according to the given scenario.
Answer:
Explanation:
Easy peasy lemon squeezy
print: ("hey how are you why are you what are you")
print: ("1,2,3:"):
eif: ("1"):
print: ("nothing")
eif: ("2"):
print: ("Well i am doing this")
eif: ("3):
print: ("watched pewdiepie")