subratract 11100 from 1011 by using 1's complement method step by step​

Answers

Answer 1
10089 is gonna be your anwser

Related Questions

For this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.

Answers

Answer:

import csv

import sys

file_csv = argv

with open( "file_csv", "rb" ) as file:

      rowlist= csv.DictReader( file )

      dict_count={ }

      for row in rowlist:

           dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1

      print( " The count of employees per department are", dict_count )

Explanation:

The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.

what are 3 important reasons to reconcile bank and credit card accounts at set dates?

Answers

Answer:

To verify transactions have the correct date assigned to them.

To verify that an account balance is within its credit limit.

To verify that all transactions have been recorded for the period.

Explanation:

what is the difference between packed and unpacked bcd numbers ​

Answers

Explanation:

Packed BCD ( Binary coded decimal) is type in which each decimal digit is represented by 4 bits ( 1 nibble) . For Example : 14 will be shown as 0001 0100 in packed BCD form. Unpacked BCD is type in which each decimal digit is represented by 8 bits ( 1 byte).

Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.

Answers

Answer:

The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)

#include<iostream>

using namespace std;

string capt(string result)

{

result[0] = toupper(result[0]);

for(int i =0;i<result.length();i++){

 if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' ') {

  result[i+2] = toupper(result[i+2]);

 }

 if(result[i+2]==' ')  {

  result[i+3] = toupper(result[i+3]);

 }

 } }

return result;

}

int main(){

string sentence;

getline(cin,sentence);

cout<<capt(sentence);

return 0;

}

Explanation:

The method to capitalize first letters of string starts here

string capt(string result){

This line capitalizes the first letter of the sentence

result[0] = toupper(result[0]);

This iteration iterates through each letter of the input sentence

for(int i =0;i<result.length();i++){

This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)

if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' '){  ->This condition checks if the sentence is single spaced

  result[i+2] = toupper(result[i+2]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

 if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced

  result[i+3] = toupper(result[i+3]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

}

}  The iteration ends here

return result;  ->The new string is returned here.

}

The main method starts here

int main(){

This declares a string variable named sentence

string sentence;

This gets the user input

getline(cin,sentence);

This passes the input string to the method defined above

cout<<capt(sentence);

return 0;

}

Select the function completion that satisfies this docstring description: def convert_to_string(nums): """ (list of number) -> NoneType Replace each item in nums with its string equivalent. >>> nums

Answers

Answer:

def convert_to_string(nums):

   for i in range(len(nums)):

       nums[i] = str(nums[i])

nums = [7, 28, 92]

print(nums)

convert_to_string(nums)

print(nums)

Explanation:

Create a function called convert_to_string that takes one parameter, nums

Create a for loop that iterates through the nums. Inside the loop, set each item to its string equivalent using type casting (str)

Initialize a list

Print the list before the function call

Call the function, passing the list as a parameter

Then, print the list again to see the difference

help me
Q3/ Put True or false in front of the following


statements:
1- You can use the Goal seek feature available by clicking on the data what-if analysis-> Goal Seek.
2- The equations in matrix form [X]-[A] [b]. 3- The A B matrix will be 2 3 ,where A is 2*3 and B is 3*3..
4- The command of inverse is +minverse(arry1...arry2).
5- The (By Changing Cells) box should contain the location of the decision variables for the problem.​

Answers

Answer:

TrueFalseFalseTrueFalse

Explanation:

mark me as brainlyest

when an object is passed as a non-reference pointer parametor to a method, modifiying the members of that object from

Answers

Answer:

"this" keyword representing the class object itself.

Explanation:

Object-oriented programming concept emphasizes on using blueprints representing the structure of a data collection type to continuously create an instance of that data structure. The instance of that object is called a class object. It is used in database management systems to populate the database.

Functions defined in the class objects are called methods and are used specifically by the class instance to modify the data content of the class object defined.

When a member of a class is referenced in the class, it can be accessed with the "this" keyword. At an instance of the class object, the variable holding the object should be called to get the class content because of the "this" keyword binding the instance of the object to the method.

Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to group them, or classify them.c. Discuss whether you believe the control or display is suitable for its purpose.

Answers

Answer:

Open ended investigation

Explanation:

The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.

From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions

A device driver would ordinarily be written in :__________
a. machine language
b. assembly language
c. a platform-independent language, such as Java
d. an application-oriented language

Answers

Answer: Assembly language

Explanation:

A device driver is a computer program that is in charge of the operation or the controls of a device attached to a computer.

device driver would ordinarily be written in an assembly language. Assembly language is a low-level symbolic code that is converted by an assembler. It is typically designed for a particular type of processor.

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

In what way does a hash provide a better message integrity check than a checksum (such as the Internet checksum)?

Answers

Answer:

Hash function have less collision than a internet checksum because of computational infeasibility.

Explanation:

A collision means there is more then one way to produce the same sum. It is nearly difficult to developed two messages with same hash however, in checksum, it is more easier to develop or modify two messages to have same sum, thereby enabling attackers to have access to the message or the information arising to less message integrity.

Programming challenge description: In this challenge, you're given a string containing jumbled letters from several concatenated words. Each word is a numeral from zero to nine. Each numeral may be used multiple times in the jumbled string. Write a program that returns integers corresponding to the numerals used to form the jumbled string. Integers must be sorted in ascending order. For example, reuonnoinfe are shuffled letters of the strings one four nine. Your program's output should be 149.

Answers

Following are the program to the given question:

import java.util.*;//import package

public class Main//defining main method

{

public static void main (String[] axv)//defining main method

{

String nums[] = {"zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"};//defining an arrayof string

int i,j;

Scanner obxc = new Scanner(System.in);//creating Scanner class object to input value

System.out.print("Enter a string formed jumbled letters of numerals: ");//print message

String w = obxc.next();//defining a String variable that input String value

for(i=0; i<nums.length; i++)//defining a loop to count input String length

{

String sa = nums[i];//defining a string variable to hold array value

boolean f = true;//defining a boolean variable

for(j=0; j<sa.length(); j++)//defining a for loop that convets value into integer

{

char cx = sa.charAt(j);//defining char variable that hold value

if(w.indexOf(cx)==-1)//defining if block to check indexOf value

{

f = false;//use boolean variable that hold boolean value

break;//using break keyword

}

}

if(f) //use if to check boolean value

System.out.print (i);//use print method that print i value

}

System.out.println();//use print method for beak line

}

}

Output:

Enter a string formed jumbled letters of numerals: onefournine

149

Explanation of code:

Import package.Defining the main class and also define the main method in it.Inside the main method defining a string of array "nums" that holds sting value and two integer variables "i,j" is defined.In the next step, a scanner class object is declared that inputs the value.After input, a value a for loop is defined that uses a string variable that holds an array value and uses another loop that converts string value into a numeric value.

Learn more:

brainly.com/question/15126397

I really need To know how To get The special ending for final fight 2 for super nintendo it’s a video game

Answers

Answer:

Check Yt

Explanation:

More often than not there are many video tutorials about every game imaginable.

They are correct? thank you!

Answers

Answer:

Yes they are correct. welcome....

Operations that a given computing agent can perform are called

Answers

Answer:

Primitive operation

Explanation:

Operations that a given computing agent can perform are called primitive operations.

These operations are basic arithmetic work done by an algorithm such as assigning a variable, calling a method, returning an array, etc. They are sometimes written in pseudo-code.

What are the best websites to learn about Java Programing?

Answers

Answer:

well you can download some apps from the play store and it is easy for you to learn from there (interactive)

Explain what 10CLS program does and the write the output​

Answers

(CLS)


This text is being printed via the PRINT command."
On the next line, I'll use CLS, which will clear everything I just printed, so you won't even see the preceding text."
Also, you can't give CLS a line to PRINT; it won't actually do anything"
(CLS)
Finally, on line 80, I

2) What are three categories of computer languages? 3) Write four components of a QBASIC window. 4) What are the three types of operators in QBASIC? 5) What is the use of connector symbol in flowchart? 6) What is a computer network? 7) State two uses of Internet. 8) Write three examples for web browser. 9) Name some popular ISPs in Sri Lanka. 10) Differentiate between MAN and PAN.​

Answers

Answer:

2: assembly language , machine language and high level language

3: a character set , constants , variables , statements , operators and expressions

A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively if $n$ is a multiple of $d$. For example, the proper divisors of 12 are 1, 2, 3, 4, and 6, but not 12. A positive integer $n$ is called double-perfect if the sum of its proper divisors equals $2n$. For example, 120 is double-perfect (and in fact is the smallest double-perfect number) because its proper divisors are 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 24, 30, 40, and 60, and their sum is 240, which is twice 120. There is only one other 3-digit double-perfect number. Write a Python program to find it, and enter the number as your answer below.

Answers

Answer:

The program written in Python is as follows:

See Explanation section for line by line explanation

for n in range(100,1000):

     isum = 0

     for d in range(1,n):

           if n%d == 0:

                 isum += d

     if isum == n * 2:

           print(n)

Explanation:

The program only considers 3 digit numbers. hence the range of n is from 100 to 999

for n in range(100,1000):

This line initializes sum to 0

     isum = 0

This line is an iteration that stands as the divisor

     for d in range(1,n):

This line checks if a number, d can evenly divide n

           if n%d == 0:

If yes, the sum is updated

                 isum += d

This line checks if the current number n is a double-perfect number

     if isum == n * 2:

If yes, n is printed

           print(n)

When the program is run, the displayed output is 120 and 672

Discuss the different methods of authentication supported between Microsoft’s Web server (Internet Information Services) and the browsers in common use at your organization. Cover both basic authentication and Microsoft’s challenge-response scheme.

Answers

Answer:

Answered below

Explanation:

The Microsoft web server (Internet Information Services) supports the following authentication methods;

1) Basic authentication: This method uses basic authentication to restrict access to files on NTFS-formatted web servers. Access is based on user ID and password.

2) Digest authentication, which uses a challenge-response mechanism where passwords are sent in encrypted formats.

3) Anonymous authentication: In this method, the IIS creates IUSR-computerName account, to authenticate anonymous users.

4) Windows integration uses windows domain accounts for access.

5) .Net passport authentication provides users with security-enhanced access to .Net websites and services.

6) Client certificate mapping where a mapping is created between a certificate and a user account.

What triggers a LinkedIn account ban?

Answers

Answer:

Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?

Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates Messages

Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last index at which the * value occurs in the array. The method should return -1 if the value is not * found.

Answers

Answer:

The method is as follows:

public static int lastIndexOf(int [] numbers, int num){

    int lastIndex = numbers[0];

    for(int i =0; i<numbers.length;i+=num){

        lastIndex = numbers[i];

    }

    return lastIndex;

}

Explanation:

This defines the method

public static int lastIndexOf(int [] numbers, int num){

This initializes the lastIndex to the first element of the array

    int lastIndex = numbers[0];

This iterates through every "num" element of the array

    for(int i =0; i<numbers.length;i+=num){

This gets the current index... until the last

        lastIndex = numbers[i];     }

This returns the last

    return lastIndex; }

Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character

(C++ coding)

Answers

Method explanation:

Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.

Method description:

void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters

{

  for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array  

  {

      if(j%3== 0)//use if block that check 3rd character value in array  

      {

          ar[j-1] = k; //Changing the 3rd character in array

      }

  }

}

Learn more:

Program: brainly.com/question/12975989

In database a record is also called a

Answers

Explanation:

hope it helps you

pls mark this ans brainlist ans

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is

Answers

It should always be changed to show one message informing customers of the approved user policy which applies to every one computer network within our organization.The "motd" was its filename of a modified version of such a file that displays any messages after logging in.The document should be modified when the message is to be displayed before a user logs in.Please find the attached file for the complete solution.

Learn more:

user logs: brainly.com/question/7580165

Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?

Answers

Answer:

The correct answer will be "Man-in-the-browser".

Explanation:

Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?

A. Unicast address
​B. IPV6
​C. DHCP6
D. APIPA

Answers

Answer: APIPA

Explanation:

Automatic Private IP Addressing (APIPA) is a Windows based operating systems feature that allows a computer to assign itself automatically to an IP address even though there is DHCP server to perform the function.

From the information that has been provided in the question, we can see that the type of address that is used is APIPA.

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next

Answers

Answer:

The answer is "check the worksheet is not read only"

Explanation:

The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.

If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.

 

2. A computer that is easy to operate is called
I
10 POINTSSSS PLEASEEE HELPPP

DIT QUESTION

Answers

Answer:

Explanation:

A computer that is easy to operate is called User Friendly

А.
is the highest education degree available at a community college.

Answers

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

Other Questions
a factory produce 1188440 bulbs in one year (365 days) how many bulbs did it produce in the month of August Paul bought a student discount card for the bus. The card allows him to buy daily bus passes for $1.70.After one month, Paul bought 16 passes and spent a total of $35.20.How much did he spend on the student discount card? That on the first day of January, in the year of our Lord one thousand eight hundred and sixty-three, all persons held as slaves within any State or designated part of a State, the people whereof shall then be in rebellion against the United States, shall be then, thenceforward, and forever free; and the Executive Government of the United States, including the military and naval authority thereof, will recognize and maintain the freedom of such persons, and will do no act or acts to repress such persons, or any of them, in any efforts they may make for their actual freedom ... Briefly restate the most important information in the document using your own words. the sovereignty of the nation. Mark, a real estate broker, teamed up with Chris, another real estate broker, in an effort to not do business with a cross-town broker. What may Mark and Chris be accused of...? Self Dealing Vicarious Liability Group Boycotting Price Fixing The diameter of a cone is 34 ft. the height is 16 ft what is the volume in cubic ft? The winning times (in seconds) in a speed-skating event for men can be represented by the formula T = 46.97 - 0.099x, where x represents the year, with x = 0 corresponding to 1920. (For example in 1992, x would be 1992 - 1920 = 72.) According to the formula, what was the winning time in 1997? Round to the nearest hundredth. * 1 point 40.34 sec 39.35 sec 3609.07 sec 41.33 sec Adding Tag QuestionThe day is fine? The state of Georgia's first attempt at a constitutional government was initiated in 1776 by the Provincial congress called by the Georgia Trustees in response to mass meetings held throughout the colony. this document would be the transition framework as Georgia moved from colony to state. true or false Write arguments for the topic! It ismore advantegeous to live in the city than inthe village There are three commercial tax-preparation offices in City A. The local Better Business Bureau has been receiving some complaints that one of the offices does not understand tax law well enough to provide expert advice. The Better Business Bureau has decided to invest several hundred dollars in grant money to test the claim. It has selected four people at random and has asked that they allow each of the offices to prepare their taxes using the same information. The following data show the tax bills ($1,000s) as figured by each office. The following data show the tax bills as figured by each office. The data are also located in the CD-ROM file Tax-test.Return Office 1 Office 2 Office 31 4376.20 5100.10 4988.032 5678.45 6234.23 5489.233 2341.78 2242.60 2121.904 9875.33 10300.30 9845.605 7650.20 8002.90 7590.886 1324.80 1450.90 1356.89Required:Use the ANOVA procedure on your calculator for completely randomized designs to determine whether there is a significant difference in the mean taxes due on tax returns? A paleontologist finds a relative complete skeleton but isn't sure if it is an ape fossil or a hominid fossil. Which of the following features would help distinguish between the two choices?a. Position of the opening in the skull for the spinal cordb. Design of the pelvisc. Relative length of the hind limbsd. Position of the eyes You pick a marble from a bag containing 1 green marble, 4 red marbles, 2 yellow marbles, and 3 black marbles. You replace the first marble and then select a second ones find p(blue, then black). If you do not replace the first marble in the previous question before you select the 2nd one, find p(red, then red) Show your work!! Alex makes $20 per hour in her job as a kiental assistant. She works 8 hours per dayand 40 hours per week. How much does Alex make in a day before taxes? Find the probability.Two dice are rolled. Find the probability that the score on the dice is either 5 or10. Problem 16-12 Calculating WACC [LO1] Blitz Industries has a debt-equity ratio of 1.5. Its WACC is 7.7 percent, and its cost of debt is 5.4 percent. The corporate tax rate is 25 percent. a. What is the companys cost of equity capital? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) b. What is the companys unlevered cost of equity capital? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) c-1. What would the cost of equity be if the debt-equity ratio were 2? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) c-2. What would the cost of equity be if the debt-equity ratio were 1.0? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) c-3. What would the cost of equity be if the debt-equity ratio were zero? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) Without using a calculator, convert the fraction to a decimal A water sprinkler sends water out in a circular pattern. How large is the wateredarea if the radius of the watering pattern is 3 feet?Use 3.14 for pi. ____feet squared Drake Manufacturing makes a variety of products, including lawn mowers. 's Lawn Mower Division can use a component, K32, manufactured by 's Electrical Division. The market price for K32 is per unit. The variable cost per unit for K32 in the Electrical Division is $11, while the absorption cost per unit is $12. The divisions at use a negotiated price strategy to set transfer prices between divisions. The Electrical Division has excess capacity. What is the lowest acceptable transfer price to the Electrical Division? What is the highest acceptable transfer price that the Lawn Mower Division would pay?1. ______the lowest acceptable transfer price to the Electrical Division.a. $14, the difference between the variable cost and market price.b. $11, the variable cost. c. $12, the absorption cost.d. $25, the market price. 2. ______is the highest acceptable transfer price that the Lawn Mower Division would pay.a. $14, the difference between the variable cost and market price.b. $11, the variable cost. c. $12, the absorption cost.d. $25, the market price. what expression is equivalent to this equation :(-3x3y2)(5x5y4)2 Question 8 plz show ALL STEPS