answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
2 years ago
11

Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, +

82, -42, -111.
Computers and Technology
1 answer:
pshichka [43]2 years ago
6 0

Answer:

Let's convert the decimals into signed 8-bit binary numbers.

As we need to find the 8-bit magnitude, so write the powers at each bit.

      <u>Sign -bit</u> <u>64</u> <u>32</u> <u>16</u> <u>8</u> <u>4</u> <u>2</u> <u>1</u>

+25 - 0 0 0 1 1 0 0 1

+120- 0 1 1 1 1 0 0 0

+82 - 0 1 0 1 0 0 1       0

-42 - 1 0 1 0 1 0 1 0

-111 - 1 1 1 0 1 1 1 1

One’s Complements:  

+25 (00011001) – 11100110

+120(01111000) - 10000111

+82(01010010) - 10101101

-42(10101010) - 01010101

-111(11101111)- 00010000

Two’s Complements:  

+25 (00011001) – 11100110+1 = 11100111

+120(01111000) – 10000111+1 = 10001000

+82(01010010) – 10101101+1= 10101110

-42(10101010) – 01010101+1= 01010110

-111(11101111)- 00010000+1= 00010001

Explanation:

To find the 8-bit signed magnitude follow this process:

For +120

  • put 0 at Sign-bit as there is plus sign before 120.
  • Put 1 at the largest power of 2 near to 120 and less than 120, so put 1 at 64.
  • Subtract 64 from 120, i.e. 120-64 = 56.
  • Then put 1 at 32, as it is the nearest power of 2 of 56. Then 56-32=24.
  • Then put 1 at 16 and 24-16 = 8.
  • Now put 1 at 8. 8-8 = 0, so put 0 at all rest places.

To find one’s complement of a number 00011001, find 11111111 – 00011001 or put 0 in place each 1 and 1 in place of each 0., i.e., 11100110.

Now to find Two’s complement of a number, just do binary addition of the number with 1.

You might be interested in
Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
muminat

Answer:  <em>The biggest difference between the two is their functionality. Internet Banking allows you to conduct online transactions through your PC or laptop and an internet connection. On the other hand, mobile banking can be done with or without internet. Many banks nowadays have their mobile apps for mobile banking.</em>

Disadvantages of Mobile Banking

<em>If the customer does not have a smartphone than the use of Mobile Banking becomes limited. A transaction like transfer of funds is only available on high-end phones. Regular use of Mobile Banking may lead to extra charges levied by the bank for providing the service.</em>

<em />

Explanation: <u><em>Was this helpful to you? if so please put me Brainlyest.</em></u>

4 0
2 years ago
Rootkits are kernel programs having the ability to hide themselves and cover up traces of activities. It replaces certain operat
yawa3891 [41]

Answer:

Boot loader level rootkit

Explanation:

A rootkit is a malicious program which is used by hackers to gain illegal access to the computer system.A bootloader level rootkit also known as bootkit, infects the master boot record(MBR) of the hard drive.As a result bootloader level rootkit is able to compromise the boot process and can modify the boot sequence of the machine to load themselves instead of the original virtual machine monitor or operating system.

3 0
2 years ago
The process of checking data for validity and integrity before placing it in a data warehouse is called Group of answer choices
guajiro [1.7K]

Answer:

data cleaning

Explanation:

Data cleaning exemplifies the process which includes identifying the incorrect, or inaccurate data from the records. It further proceeds its function in correcting and replacing the correct data in the records or database. By adding information, by deleting incorrect information and modifying the incorrect information are some of the ways by which data cleaning is done.

7 0
2 years ago
"There are 1.6093 kilometers in a mile. Create a variable to store a number of miles. Convert this to kilometers, and store in a
Karolina [17]

MATLAB CODE:

%%%%

clc

dist_mile=input('enter the distance in miles') %%%dist_mile stores given distance in miles

dist_km=dist_mile*1.6093 %%coversion of dist_mile into km and storing in dist_km

%%%%

OOUTPUT:

enter the distance in miles

2

dist_km

3.2186

4 0
2 years ago
7. Which of these statements is true? Agile is a programming language MySQL is a database HTML stands for "Hypertext Markup Link
timurjin [86]

Answer:

None of them is correct, but it seems one of the option has missing words.

The exact definition is, MySQL is a database management system.

Explanation:

Agile is not a programming language, it is a software development methodology.

HTML stands for "Hypertext Markup Language"

Java and JavaScript are different languages.

Actually,  MySQL is a database management system. It is used to deal with the relational databases. It uses SQL (Structured Query Language).

5 0
2 years ago
Other questions:
  • 5.William travels a lot on business purpose. He needs to regularly communicate with his business partner. He also needs to send
    15·1 answer
  • For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distribute
    6·1 answer
  • In which job role would a course in 3D modeling help with professional career prospects?
    11·1 answer
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • Write a loop that prints each country's population in country_pop. Sample output for the given program.
    6·1 answer
  • ________ is a free online service that enables a user to contact a cell phone number to hear who answers the telephone without i
    5·1 answer
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • Write a program for determining if a year is a leap year. In the Gregorian calendar system you can check if it is a leaper if it
    15·1 answer
  • An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
    12·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!