Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Obtain 1's and 2's complement of 1010 using only four-digit representation.
Solution:
1's complement: 1's complement of 1010 is
Please note that wherever you have a digit 1 in number then complement contains 0 for that digit and vice versa. In other words to get 1's complement of a binary number we only have to change all 1's of the number to 0 and all zeros to 1's. This can be done by complementing every bit of binary number.
2's complement:
Adding 1 in 1's complement will produce 2's complement
The 2's complement can also be getting by not complementing least significant zeros till first 1 is encountered. This 1 is also not complemented. After this 1 rest of all bits are complemented on left.
Consequently 2's complement of given number (using this method) must be (you can check it by obtaining 2's complement as we have done in the illustration).
An important terminal that is required between DTE and PSTN is (A) Server (B) MODEM (C) Relay
The process of entering data into a ROM is called ? Ans. The process of entering data in ROM is termed as programming the ROM.
What is the difference between absolute and relative path name of a file? Absolute path name: This is listing of the directories and files from the root directory to the i
What is the basic requirement for establishing VLANs?
What are the two primary models of Supply Chain Management? The Two Primary models of Supply Chain Management are:- 1. Porter's Value Chain Model 2. Supply Chain Model
The Signalling connection control part (SCCP) and message transfer part (MTP) together are referred to as (A) Signal Switching Points (SSPs) (B) Signal Transfer Points
List the key notions concerning macro expansion. Two key notions relating to macro expansion is: 1. Expansion time control flow- Determines the order of model statements tha
Q. Show Buffered mode for Point-to-point Message Passing? Buffered mode: Transmitting can be started whether or not matching receives has been started and transmitting may comp
Detail explanation of Cryptographic modules Physical security of the cryptographic modules is also built in order to provide total security of the whole system and protect from
Explain the life cycle of a process Each procedure has a life cycle, which consists of execution, creation and termination phases of the procedure. A method may create severa
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd