subratract 11100 from 1011 by using 1's complement method step by step​

Answers

Answer 1
10089 is gonna be your anwser

Related Questions

Write a pseudocode For loop that displays all the numbers from 0 to 5, one at a time. We have the following pseudocode so far. Declare Integer number Write this statement Display number End For Type the exact text for the line of pseudocode that should replace Write this statement shown above.

Answers

Answer:

The statement is:

For number = 0 to 5

Explanation:

Given

The incomplete pseudocode

Required

The loop statement to complete the pseudocode

To loop from 0 to 5, we make use of:

For number = 0 to 5

Where:

number is the integer variable declared on line 1

So, the complete pseudocode is:

Declare Integer number

For number = 0 to 5

Display number

End For

Write and application that reads five integers from the user and determines and prints the largest and the smallest integers. Use only the programming techniques your learned in this chapter (use only if statements) 1.2. Modify your first program to add 2 more functions, the first function should determines the largest number and the second smallest. Both new functions must get invoked from the main function.

Answers

Answer:

#include <stdio.h>  

#include <limits.h>  

 

/* Define the number of times you are going  

  to ask the user for input. This allows you  

  to customize the program later and avoids the  

  hard coding of values in your code */  

#define NUMVALS 5  

 

int main(void)  

{  

   int i = 0;  

   int curval = 0;  

   /* Set your initial max as low as possible */  

   int maxval = INT_MIN;  

   /* Set your initial min as high as possible */  

   int minval = INT_MAX;  

 

   /* Loop through and ask the user for the defined  

      number of values */  

   for (i = 0; i < NUMVALS; i++)  

   {  

       /* Ask the user for the next value */  

       printf("Enter the next value: ");  

 

       /* Get the next value from the user */  

       scanf("%d", &curval);  

 

       /* Check to see if this is our biggest or  

          smallest value yet */  

       if (curval > maxval)maxval = curval;  

       if (curval < minval)minval = curval;  

   }  

 

   /* Output the results */  

   printf("The smallest value entered was: %d \n", minval);  

   printf("The largest value entered was: %d \n", maxval);  

 

   /* End the program */  

   return 0;  

}

Explanation:

Secure email technique that provides confidentiality, along with authentication, integrity, and non-repudiation. It uses a centralized trust model where users get a certificate from a trusted CA.

a. True
b. False

Answers

Answer:

a

Explanation:

just put a

Discuss the OSI Layer protocols application in Mobile Computing

Answers

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to both Alice and Bob (protocol in page 338). Alice and KDC have A5 (hexa) as a shared key. Bob and KDC have 4B (hexa) as a shared key. Alice sends a request to KDC to generate a session key so it can communicate with Bob. KDC generates 56(hexa) as a session key. Alice intends to send 13 (hexa) as a message to Bob. For simplicity assume that the encryption and decryption operations are simply XOR operation of the key with the message. Answer the following.
1. What information does KDC send to Alice? Show as hex characters.
2. What information does Alice send to Bob? Show as hexa characters.
3. What message does Bob retrieve after decryption? Show as hexa characters.

Answers

3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.

Respuesta: la clave con el mensaje :

Describe two types of storage devices?​

Answers

Answer:

Central Process Unit and Random Access Memory

In the Gradient Descent algorithm, we are more likely to reach the global minimum, if the learning rate is selected to be a large value.

a. True
b. False

Answers

False iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Answer:

false i think.

Explanation:

Gradient Descent is more likely to reach a local minima. because starting at different points and just in general having a different starting point, will lead us to a different local minimum( aka the lowest point closest to the starting point). if alpha(the learning rate) is too large, gradient descent may fail to converge and may even diverge.

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.

Justify your answer
Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.

Answers

1. Based on Scenario A, the packets should be encapsulated in multiple frames to minimize the re-transmission overhead.

This is because there will be the need to re-transmit the packets because the network environment is not reliable and accurate.  Therefore, a single frame may be too costly when the need for re-transmission arises.

2. Based on Scenario B, the packets should be encapsulated in a single frame because of the high level of network reliability and accuracy.  

There will not be further need to re-transmit the packets in a highly reliable and accurate network environment.  This environment makes a single frame better.

Encapsulation involves the process of wrapping code and data together within a class so that data is protected and access to code is restricted.

With encapsulation, each layer:

provides a service to the layer above itcommunicates with a corresponding receiving node

Thus, in a reliable and accurate network environment, single frames should be used to enhance transmission and minimize re-transmission overhead.

Learn more about data encapsulation here: https://brainly.com/question/23382725

What is the importance of planning a web page before starting to create it?

Answers

The importance of planning a web page according to the question is provided below.

A well-designed company's website may contribute to making even your potential consumers a favorable immediate impression.

This might also assist people to cultivate guidelines and make additional transformations. Further significantly, it brings pleasant client interaction as well as allows customers to your website unrestricted access as well as browse easily.

Learn more about the web page here:

https://brainly.com/question/9060926

Create a python program that display this
Factorial Calculator
Enter a positive integer: 5
5! = 1 x 2 x 3 x 4 x 5
The factorial of 5 is: 120
Enter a positive integer: 4
4! = 1 x 2 x 5 x 4
.
The factorial of 4 is: 24
Enter a positive integer: -5
Invalid input! Program stopped!​

Answers

Answer:

vxxgxfufjdfhgffghgfghgffh

Write a query to display the department name, location name, number of employees, and the average salary for all employees in that department. Label the columns dname, loc, Number of People, and Salary, respectively.

Answers

Answer:

is hjs yen ; he jawjwjwjwjw

Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

Suppose we have 999 records of employees Emp1, Emp2, Emp5, Emp6 and so on up to Emp998 and Emp999 stored in a sequence. Hence, records are nothing but a row in the table. In the employee table, we want to insert new records Emp3 and Emp4 in the sequence, and once we have done insertion we need to update and retrieve the record efficiently to optimize the performance of a database by minimizing the access time when query is being executed.

You are required to solve the problem with the index sequential access method with pros and cons in the given scenario

Answers

The records in the table represents the employee ID of each employee. Assume the table name is EMPLOYEES and the field name of employee IDs is ID, the following SQL query inserts Emp3 and Emp4 into the employees table.

INSERT INTO EMPLOYEES (ID) values (Emp3), (Emp4)

The advantage of using ISAM is that priorities are given to the indices of the records being inserted. So, Emp3 and Emp4 will be inserted immediately after Emp2.

However, a major disadvantage of using ISAM is that it is very expensive to keep the indices in a sequential order;

See attachment for the illustration of Index sequential access method (ISAM).

Read more about Index sequential access method (ISAM) at:

https://brainly.com/question/4692093

3. A 3D model of a designed product would be used to communicate the

Answers

Answer:

A 55

Explanation:

A 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

What is 3D?

It should be noted that 3D modeling is the process if developing a coordinate representation of an object.

In this case, a 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

Learn more about 3D on:

brainly.com/question/26350554

#SPJ2

What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?

Answers

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

explain computer coding in an understandable manner​

Answers

Answer:

Coding is simply how we communicate with computers. Code tells a computer what actions to take, and writing code is like creating a set of instructions

Explanation:

Computer coding empowers kids to not only consume digital media and technology, but to create it. Instead of simply playing videogame or envision what their own website, or app might look like and they'll have the outlet for the expression

The Cartesian product of two lists of numbers A and B is defined to be the set of all points (a,b) where a belongs in A and b belongs in B. It is usually denoted as A x B, and is called the Cartesian product since it originated in Descartes' formulation of analytic geometry.

a. True
b. False

Answers

The properties and origin of the Cartesian product as stated in the paragraph

is true, and the correct option is option;

a. True

The reason why the above option is correct is stated as follows;

In set theory, the Cartesian product of two number sets such as set A and set

B which can be denoted as lists of numbers is represented as A×B and is the

set of all ordered pair or points (a, b), with a being located in A and b located

in the set B, which can be expressed as follows;

[tex]\left[\begin{array}{c}A&x&y\\z\end{array}\right] \left[\begin{array}{ccc}B(1&2&3)\\\mathbf{(x, 1)&\mathbf{(x, 2)}&\mathbf{(x, 3)}\\\mathbf{(y, 1)}&\mathbf{(y, 2)}&\mathbf{(y, 3)}\\\mathbf{(z, 1)}&\mathbf{(z, 2)}&\mathbf{(z, 3)}\end{array}\right]}[/tex]

The name Cartesian product is derived from the name of the philosopher,

scientist and mathematician Rene Descartes due to the concept being

originated from his analytical geometry formulations

Therefore, the statement is true

Learn more about cartesian product here:

https://brainly.com/question/13266753

12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.

Answers

Answer:index(E3:H12,1)

Explanation:

Answer: =INDEX(AcademicGroups,1,1)

Explanation:

Use the INDEX function (fx) button and you will be provided two different arguments to choose from.

Select the argument: array,row,num,column,num

In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).

In the Row_num section, enter the number 1

In the Column_num section, enter the number 1

Press OK

Hopefully the logic behind this, after seeing it, makes sense.

please i need helpWhen something is not in accordance with the rules or standards for right conduct or practice, it is called

copyright
global plagiarism
plagiarism
unethical

Answers

The answer is Unethical

The answer is:

D) unethical

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

what is the basic size of supercomputer​

Answers

Answer:

200 to 300 gigabytes or more.

Answer:

200 to 300 gigabytes or more

Explanation:

Java there are n coins each showing either heads or tails we would like all the coins to form a sequence of alternating heads and tails what is the minimum number of coins that must be reversed to achieve this

Answers

El número mínimo de monedas que se deben invertir para lograr esto:

45 moas

What would be displayed if the “=proper(A1)” function is applied to the cell below?

Answers

The answer is D: Pedro Garcia

Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?

a. /root/.profile
b. /etc/profile
c. /root/.bashrc
d. /etc/bashrc

Answers

Clarissa should modify the file /root/.profile.

Runtime environment variables

The Runtime environment variables are defined as the key pairs that are deployed along the function. The variables are mainly scoped to a function in the project.

Therefore, in the context, Clarissa wishes to modify the run time environment variable which can be used for all the new logins and also for the new instances for the BASH shell. So for this, Clarissa should modify the /root/.profile file command.

Learn More :

https://brainly.in/question/10061342

The environmental variable is a dynamic-name value, that might alter how the way a computer works. These constitute part of nature where a process is carried.In the Container Management, every value of Environment Variables might be changed or the code that whilst also might be executed during runtime: Throughout the Property of each Environment modifications introduced in the Container Management got saved.

Following are the description of the wrong choice:

In option b and option d, both are wrong because it's file directory.In option c,  it is a software file directory which install in the main disk, that's why it is wrong.

Therefore, the "/root/.profile" file should be changed by Clarissa.

Learn More :  

https://brainly.in/question/6708999

i need an introduction of apple and microsoft

Answers

During the first Macintosh's development and early years of production, Microsoft was a critical Apple ally. The software pioneer created important programs for Apple's PC in the early '80s. ... Jobs lashed out at Gates during a meeting later that same year and equated Microsoft's plans for Windows to theft.

Why coding conventions are important? Compare the coding conventions of JAVA.

Answers

Answer:

Naming conventions make programs more understandable by making them easier to read. They can also give information about the function of the identifier-for example, whether it's a constant, package, or class-which can be helpful in understanding the code.

You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.

Answers

Following are the steps of the polynomial-time algorithm:

Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from[tex]\bold{ low \ to\ mid+1}[/tex] using only these roads.There is a solution if every shop can be reached by road only up to [tex]\bold{mid+1}[/tex], but not up to mid.You can [tex]\bold{set \ low = mid+1}[/tex] if all businesses aren't accessible using both [tex]\bold{mid\ and\ mid+1}[/tex] roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because [tex]\bold{ low > high}[/tex]You can do this by [tex]\bold{set\ mid = \frac{(low + high)}{2}}[/tex]The new low, mid, and high numbers are used in step (a).

In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.

Learn more:

polynomial-time algorithm: brainly.com/question/20261998

The First Web page you will see every time you launch the Web Browser Application is called​

Answers

Answer:

HomePage

Explanation:

Use the Excel worksheet data below to solve the following questions.
H
1
J
5
6
7
7
8
5
do 00
9
10
A
12
8
11
9
T
9
3
4
w
9
11
12
13
14
15
17
15
7
M
column H 2n cicle de genula
ingles are creation CHF HIM)
2. Write the function that would find the average cells in
(2 marks)
3. Write the function that would find the total values in column J (2 marks)
4. Write the function that would count all values.
(2 marks)
5. Write the function that would count the number of
occurrences of 9 in the entire range
(3 marks)

Answers

Answer:

I love Microsoft Excel!

Explanation:

2 - The function that would find the average of a particular range is =AVERAGE(). This is used to find the average of something by calculating the arithmetic mean (or just "mean").

3 - The function that would find the total values within a particular range---or in this case, Column J---you would use the =SUM() function. This will add up all of the values in the range you selected. An example could be that Column X has the values of 5, 6, 12, 45, 3. =SUM(X1:X5) = 71.

4 - The function that would count all values is defined as =COUNT(). An example would be =COUNT(A1:A10).

5 - The function that would count the number of occurrences within a particular range is defined as =COUNTIF(). Within the parentheses, you would put the range of data that you are working with. Then, in quotations, you would put the name or value that you are trying to find.

In your case, it would be =COUNTIF(range,"9") ((I put range in there since I do not know what your range is as it is not defined within the context of this question))

WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?

Answers

Answer:

python is probably the best is you are a begginer

java and C++ are good too

Other Questions
can someone help me write a persuasive paragraph on something? it can be anything just something appropriate please Hello! Im really struggling with this, any help is appreciated (: HELP FAST 100 POINTS MUCH SHOW WORK Part b. is the second part of this question.If you could explain to me or answer, I'd really appreciate it. This is sort of urgent, so I'd need to get it done soon. Thank you. Write an expression in simplified form for the area of each rectangle. Width: 11 Length: 3x+2 How are nucleic acids and proteins similar?O A. They are both polymers.O B. They are both made of amino acids.O C. They are both made of carbohydrates.O D. They are both polysaccharides. fais une phrase avec di, de la, de, d' et de l' avec les objects de la maison(10) do cats fly?????????? "There's no tipping point. It's a constant evolution of howwe eat [and] what the supermarket is going to look like."The suffix - tion in the words evolution and description mostlikely meansA. AboveB. Fear ofC. NearD. State of 5.The width of a rectangle is one foot more than a third of the length. If theperimeter is 42 feet, what is the width? What is the length? any person who opens the door he applies a=3x + 2y/3x - 2y. If y =4, x=6 find the value of a. What is the simplest form of 20 over 315? QUEThe angle of depression of a banana from the monkey on the tree25m high is 560. Calculate the distance of the banana from thefoot of the treeand ton xamples of each PLZ GIVE DETAILED EXPLATION WITH ANSWER.WILLMARK BRAINLIEST write a story started i couldn't belive what my dad had just said Solve the formula for the specific variable Z=x-y/3Y=____ What is the slope of the line shown below? A. [tex] \frac{1}{2} [/tex]B.[tex] - \frac{1}{2} [/tex]C. [tex]2[/tex]D. [tex] - 2[/tex] Please help, the question is in the picture si t=2h cul es el valor de N? PORFAVOR AYUDA