Assume 151 and 214 are signed 8-bit decimal integers stored in two’s complement format. Calculate 151 + 214 using saturating arithmetic. The result should be written in decimal. Show your work

Answers

Answer 1

Answer:

-128

Explanation:

\((151)_{10}\)

We have to convert this decimal number into the binary number

\((10010111) _{2}\)

Performing the 2's complement number so we have to subtract 1 from this

\(10010111 -1 \\=(10010110)_{2}\)

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

\((10010110)_{2} ---->(01101001)_{2}\)

The previous number is converted binary to decimal we get ,

\((01101001)_{2}=(105) _{10}\)

-105(According to the rule of 2's complement )

Similarly same process will apply on the \((214)_{10}\)

We have to convert this decimal number into the binary number

\((11010110)_{2}\)

Performing the 2's complement number so we have to subtract 1 from this

\(11010110 - 1 =(11010101)_{2}\)

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

\((11010101)_{2}---------> (00100101)_{2}\)

The previous number is converted binary to decimal we get ,

\((00100101)_{2}------->(42)_{10}\)

-42(According to the rule of 2's complement )

Therefore the result is

151 + 214

=(-105 + (-42)

=-147

Hence the -147 is smaller then -128 that is smaller 8 bit signed integer is Therefore result is : -128


Related Questions

_______________________ is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time. The tool provides graphs showing the number of unique visitors over time, monthly metrics for each domain name (such as number of referring sites), and top search terms for each of the domain names entered.

Answers

Compete. com  is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

What is Web traffic?

The term Website traffic connote when a web users is said to  visit a website. Web traffic is said to be calculated by the times in visits, known as "sessions," .

Note that the tool or computer index Compete.com  is said to be a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

The options are:

Compete.com

Goo gle Trends

Hoot Suite

You Tube Analytics

Learn more about tools from

https://brainly.com/question/24625436

Assignment 4: Divisible by Three
Write a program that will ask a user how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is divisible by 3 or not. Continue doing this as many times as the user indicated. Once the loop ends, output how many numbers entered were divisible by 3 and how many were not divisible by 3.

Hint: For a number to be divisible by 3, when the number is divided by 3, there should be no remainder - so you will want to use the modulus (%) operator.

Hint: You will need two count variables to keep track of numbers divisible by 3 and numbers not divisible by 3.

Sample Run 1
How many numbers do you need to check? 5
Enter number: 20
20 is not divisible by 3.
Enter number: 33
33 is divisible by 3.
Enter number: 4
4 is not divisible by 3.
Enter number: 60
60 is divisible by 3.
Enter number: 8
8 is not divisible by 3.
You entered 2 number(s) that are divisible by 3.
You entered 3 number(s) that are not divisible by 3.
Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is not divisible by 3.
Enter number: 3
3 is divisible by 3.
Enter number: 400
400 is not divisible by 3.
You entered 1 number(s) that are divisible by 3.
You entered 2 number(s) that are not divisible by 3.

Benchmarks
Prompt the user to answer the question, “How many numbers do you need to check? “
Create and initialize two count variables - one for numbers divisible by 3 and one for numbers not divisible by 3.
Based on the previous input, create a for loop that will run that exact number of times.
Prompt the user to "Enter number: "
If that number is divisible by 3, output “[number] is divisible by 3.”
Update the appropriate count variable.
Or else if the number is not divisible by 3, output “[number] is not divisible by 3.”
Update the appropriate count variable.
Output “You entered [number] number(s) that are divisible by 3.”
Output “You entered [number] number(s) that are not divisible by 3.”

Answers

Answer:

# Prompt the user to enter how many numbers they would like to check

num_numbers = int(input("How many numbers do you need to check? "))

# Initialize two count variables - one for numbers divisible by 3, and one for numbers not divisible by 3

count_divisible = 0

count_not_divisible = 0

# Create a for loop that will run the number of times specified by the user

for i in range(num_numbers):

   # Prompt the user to enter a number

   number = int(input("Enter number: "))

   # Check if the number is divisible by 3

   if number % 3 == 0:

       # If the number is divisible by 3, output a message and update the count

       print(f"{number} is divisible by 3.")

       count_divisible += 1

   else:

       # If the number is not divisible by 3, output a message and update the count

       print(f"{number} is not divisible by 3.")

       count_not_divisible += 1

# Output the final counts of numbers that are and are not divisible by 3

print(f"You entered {count_divisible} number(s) that are divisible by 3.")

print(f"You entered {count_not_divisible} number(s) that are not divisible by 3.")

What is the original
name for Pendrive​

Answers

Answer:

The first flash drives had 8 megabytes of storage. Each year, larger flash drives will become available. In April 2012, 256 gigabyte flash drives were introduced to the market. Other common names for a flash drive include pendrive, thumbdrive or simply USB.

Explanation:

C++ program

Sort only the even elements of an array of integers in ascending order.

Answers

Answer: Here is one way you could write a C++ program to sort only the even elements of an array of integers in ascending order:

Explanation: Copy this Code

#include <iostream>

#include <algorithm>

using namespace std;

// Function to sort only the even elements of an array in ascending order

void sortEvenElements(int arr[], int n)

{

   // create an auxiliary array to store only the even elements

   int aux[n];

   int j = 0;

   // copy only the even elements from the original array to the auxiliary array

   for (int i = 0; i < n; i++)

       if (arr[i] % 2 == 0)

           aux[j++] = arr[i];

   // sort the auxiliary array using the STL sort function

   sort(aux, aux + j);

   // copy the sorted even elements back to the original array

   j = 0;

   for (int i = 0; i < n; i++)

       if (arr[i] % 2 == 0)

           arr[i] = aux[j++];

}

int main()

{

   // test the sortEvenElements function

   int arr[] = {5, 3, 2, 8, 1, 4};

   int n = sizeof(arr) / sizeof(arr[0]);

   sortEvenElements(arr, n);

   // print the sorted array

   for (int i = 0; i < n; i++)

       cout << arr[i] << " ";

   return 0;

}

Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.

Answers

Answer:

Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.

Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.

Explanation:

Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.

The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.

data privacy may not be applicable in which scenarios?
1. an app targeted at children for entertainment
2.a platform developed purely for knowledge exchangewith no motive of financial incentive
3.a platform being hosted in a country with no dp laws but targeted at data subjects from a country with stringent DP laws
4.a website for disseminating knowledge and that allows anonymous access

Answers

Data privacy may not be appropriate within the following scenarios:

An app focused on children for amusement: Whereas information security is vital, uncommon controls such as the Children's Online Protection Security Act (COPPA) might apply instep.A stage created absolutely for information trade with no rationale of monetary motivation: As long as individual information isn't collected or prepared, information protection may not be specifically appropriate.A stage being facilitated in a nation with no information protection laws but focused on information subjects from a nation with rigid information protection laws: The stage ought to comply with the information security laws of the focused country, regardless of the facilitating area.Web site for spreading information and permitting mysterious get to In case no individual information is collected or connected to the clients, information security may not be specifically pertinent, but other contemplations like site security ought to still be tended to.

In situation 1, particular directions like COPPA may administer data privacy for children.

In situation 3, compliance with the focus on the country's data privacy laws is fundamental notwithstanding of facilitating area.

Learn more about data privacy here:

https://brainly.com/question/31211416

#SPJ1

DSL full form in computer
please give me answer fast​

Answers

Answer:

Digital subscriber line

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

Write a program that reads in the first name, hourly rate and number of hours worked for 5 people. Print the following details for each employee. Name of employee The number of hours worked Their weekly gross pay.This is calculated by multiplying hours worked times hourly rate. If hours worked per week is greater than 40, then overtime needs to also be included. Overtime pay is calculated as the number of hours worked beyond 40 * rate * 1.5 Taxes withheld Our tax system is simple, the government gets 20% of the gross pay. Net paid The amount of the check issued to the employee.

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    String name;

    double hourlyRate;

    int hours;

    double grossPay = 0.0;

    double netPaid = 0.0;

    double taxes = 0.0;

   

    Scanner input = new Scanner(System.in);

   

    for (int i=1; i<=5; i++){

        System.out.print("Enter the name of the employee #" + i + ": ");

        name = input.nextLine();

       

        System.out.print("Enter the hourly rate: ");

        hourlyRate = input.nextDouble();

       

        System.out.print("Enter the hours: ");

        hours = input.nextInt();

        input.nextLine();

       

        if(hours > 40)

            grossPay = (40 * hourlyRate) + ((hours - 40) * hourlyRate * 1.5);

        else    

            grossPay = hours * hourlyRate;

       

        taxes = grossPay * 0.2;

        netPaid = grossPay - taxes;

       

       

        System.out.println("\nName: " + name);

        System.out.println("The number of hours worked: " + hours);

        System.out.println("The weekly gross pay: " + grossPay);

        System.out.println("Taxes: " + taxes);

        System.out.println("Net Paid: " + netPaid + "\n");

    }

}

}

Explanation:

*The code is in Java

Declare the variables

Create a for loop that iterates 5 times (for each employee)

Inside the loop:

Ask the user to enter the name, hourlyRate and hours

Check if hours is above 40. If it is, calculate the gross pay and overtime pay using the given instructions. Otherwise, do not add the overtime pay to the gross pay

Calculate the taxes using given information

Calculate the net paid by subtracting the taxes from grossPay

Print the name, hours, grossPay, taxes, and netPaid

Write a letter to a relative, encouraging her to accept an unwanted family heirloom​

Answers

Since the purpose of the letter is to encourage a relative to accept an unwanted family heirloom, writing a persuasive letter is recommended.

A persuasive text is one that aims to convince the reader through the use of a well-structured argumentative discourse. An indirect communication can be used, where the argument is presented before the main objective of the text.

Some elements can help in building a persuasive letter, they are:

Organization and accuracy of ideasHonesty in exposing reasonsWell-structured argumentation with factsEmotional connection.

It is necessary for the reader to realize that the ideas in the text were written in an honest and objective way, with facts and well-structured arguments that lead to reflection and to reassess his opinion about a certain subject.

Learn more here:

https://brainly.com/question/21100911

__________ is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

Answers

Answer:

Prototyping!! :)

Explanation:

Prototyping is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

What is software development?

The process of writing code to develop a program is handled by a computer programmer.

A software developer oversees every step of the process, defining the project's requirements before collaborating with programmers to construct the code.

According to that, software developer differs from computer programmer since they need leadership abilities because they have to oversee every step of the program-making process and interact with others.

Therefore, the goal of the software development approach known as prototyping is to provide numerous test versions of a project for client assessment.

To learn more about software development, refer to the link:

https://brainly.com/question/24085818

#SPJ5

Discussion Topic
Personal finance includes income as well as expenses. You must manage your
personal finances daily, weekly, or monthly. Discuss the advantages of using
spreadsheets for managing personal finances.

Answers

The advantages of using spreadsheets for managing personal finances is that:

Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

What is the advantage of using a spreadsheet?

The Advantage is that it is one that help[s a person to be able to organizing a lot of data.

Note that The advantages of using spreadsheets for managing personal finances is that:

Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

Learn more about spreadsheets  from

https://brainly.com/question/26919847

#SPJ1

42. 43. 44. 45. 46. 47. 48 Abrasion, incised, punctured are examples of (b) strain (c) wound (a) sprain Strain is to muscle while sprain is to (a) flesh (b) blood (c) bone The natural world in which people, plants and animals live in is (a) town (b) house (c) village The act of making places and things dirty, harmful and noisy is (a) pollution (b) game (c) pollutants A set of programs that controls and coordinates the internal ac (a) translator (b) system software (c) u The following are safety measures to be considered when usin (a)overload power point (b) sitting posture (c) using the anti- (d) positioning of the monitor base ​

Answers

Abrasion, incised, punctured are examples of wound .

What type of injury is abrasion?

Abrasions is known to be a kind of superficial injuries that happens to the skin and also the visceral linings of the body.

Note that it also lead to  a break in the lifetime of tissue and as such one can say that Abrasion, incised, punctured are examples of wound .

Learn more about Abrasion from

https://brainly.com/question/1147971

#SPJ1

Tatiana's friend shared a video with her through email. Tatiana has a hearing impairment. To help understand what's said in the video, Tatiana can use

Answers

Since Tatiana has a hearing impairment. To help understand what's said in the video, Tatiana can use the vibrations made by musical sounds.

Can those who have hearing loss appreciate music?

Those who have hearing loss can still appreciate music in a similar way to before if they collaborate with their certified audiologist to choose the best course of action.

IDEA defines ring impairment as "a hearing impairment, whether permanent or variable, that adversely impacts a child's academic achievement."

Although they may not be able to hear, d/Deaf persons can use the vibrations created by musical sounds to help them "listen" to music. Musicians with hearing loss frequently use the vibration of their instrument, or the surface to which it is linked, to help them feel the sound that they create.

Lean more about hearing impairment from

https://brainly.com/question/24900023
#SPJ1

The signature for the nonmember < operator function for comparing two Rational objects is __________.
A. bool operator<(const Rational& r1, const Rational& r2)
B. bool C. bool operator<(Rational r1, Rational r2)
D. bool operator(<)(const Rational& r1, const Rational& r2)

Answers

The Correct answer is  C) bool operator<(Rational r1, Rational r2)

What is  Boolean Operator?Boolean operators are straightforward words (AND, OR, NOT, or AND NOT) that are used as conjunctions in searches to combine or exclude keywords, producing more specialised and useful results. This should reduce time and effort spent by removing ineffective hits that  be scanned before being thrown away.The number of records returned can be significantly decreased or increased by using these operators.Boolean operators are useful for speeding up searches by narrowing results to those that are more relevant to your needs and removing irrelevant or inappropriate results.Boolean operators may be used slightly differently by each search engine or database collection, or they may need to be entered in capital letters or with certain punctuation. The guide to the particular database can be discovered with the precise wording.

To learn more about Boolean Operator refer to:

https://brainly.com/question/5029736

#SPJ4

you have installed a package called mathpac with apt-get. after a system upgrade, the package is not working correctly. which of the following commands is the most correct method to get the package to work?

Answers

The correct answer is aptitude. A interface to the apt-get purge package management infrastructure is provided by the aptitude package manager for Debian GNU/Linux systems.

Apt-get, which supports other APT-based utilities, can be thought of as lower-level and "back-end". Apt's output might alter across versions because it is created for end users (humans). Remarks from apt(8) The 'apt' command does not need to be backward compatible like apt-get because it is designed to be user-friendly (8). The apt-get command is used on Linux operating systems that make use of the APT package management system to install, uninstall, and carry out other actions on installed software packages. Popular package management programmes like APT and YUM were developed for Linux distributions based on Red Hat and Debian, respectively. The two package managers are among the most widely used and straightforward tools for managing packages.

To learn more about apt-get purge click the link below:

brainly.com/question/30332568

#SPJ4

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

Answers

There are different kinds of movement. The technique that was the threat actor using to move through the network is Lateral Movement.

Network Lateral Movement, is simply known as a method used by cyber attackers, or threat actors, to quickly move through a network as they search for the key data and assets that are the main hit or target of their attack work.

In this kind of movement, when an attacker do compromise or have the power or control of one asset within a network, it quickly transport or moves on from that device to others while still within the same network.

 Examples of Lateral movement are:

Pass the hash (PtH) Pass the ticket (PtT) Exploitation of remote services, etc.

See full question below

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

A. Initial Compromise

B. Lateral movement

C. Privilege escalation

D. Data exfiltration

Learn more about Lateral movement from

https://brainly.com/question/1245899

Kevin owns a toy company. How should he ensure that his customers are receiving a high-quality product Question 1 options: Offer a discount on future purchases to customers Repair products that have been sold to customers and are broken Survey customers and ask for suggestions Test a prototype

Answers

To ensure that his customers are receiving a high-quality product, Kevin can take a number of steps.

One option is to test a prototype before launching the final product to ensure that it meets the desired quality standards. Additionally, he can use customer feedback to improve the quality of the product. He can survey customers and ask for suggestions to understand their needs and preferences. Kevin can also offer a warranty or guarantee on his products and repair or replace products that have been sold to customers and are broken. By doing so, he can demonstrate his commitment to customer satisfaction and improve his company's reputation for producing high-quality products.

To know more about prototype visit:

https://brainly.com/question/28370530

#SPJ1

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is not in BCNF, decompose it into a set of BCNF relations that preserve the dependencies.
1. C → D, C → A, B → C
2. B → C, D → A
3. ABC → D, D → A
4. A → B, BC → D, A → C
5. AB → C, AB → D, C → A, D → B

Answers

Solution :

1.

a). Candidate keys : \($B$\)

b). R is in \($2F$\) but not \($3NF$\)

c). C → \($D$\) and C → \($A$\), both causes violations of \($BCNF$\). The way to obtain the join preserving decomposition is to decompose \($R$\) into \($AC, BC$\) and CD.

2.

a). Candidate keys : \($BD$\)

b). \($R$\) is in \($1NF$\) but not \($2NF$\).

c). Both B → \($C$\) and D → \($A$\) cause \($BCNF$\) violations. The decomposition : \($AD $\), \($BC, BD$\) is \($BCNF$\) and lossless and the join preserving.

3.

a). Candidate keys : \($ABC, BCD$\)

b). R is in \($3NF$\) but not \($BCNF$\)

c).\($ABCD$\) is not in \($BCNF$\) since D → \($A$\) and \($D$\) is not a key. But if we split up the \($R$\) as \($AD,BCD$\) therefore we cannot preserve dependency \($ABC$\) → D. So there is no \($BCNF$\) decomposition.

4.

a). Candidate keys : \($A$\)

b). R is in \($2NF$\) but not \($3NF$\)

c). BC → \($D$\) violates \($BCNF$\) since \($BC$\) does not contain the key. And we split up R as in \($BCD, ABC$\).

5.

a). Candidate keys : \($AB, BC, CD, AD$\)

b). \($R$\) is in \($3NF$\) but not \($BCNF$\).

c). C → \($A$\) and D → \($B$\) both causes a violations. The decomposition into \($AC,BCD$\) but this will not preserve \($AB$\) → C and \($AB$\) → D, and \($BCD$\) is still not \($BCNF$\) because \($D$\) → \($B$\). So we need to decompose further into \($AC,BD,CD$\) However when we try to revive the lost functional dependencies by adding \($ABC$\) and \($ABD$\), we that these relations are not in \($BCNF$\) form. Therefore, there is no \($BCNF$\) decomposition.

State OLLORS Assignment 5 uses of Database Management. Answer​

Answers

Database management has several important applications, including data storage and retrieval, data analysis, data integration, security management, and data backup and recovery.

One of the primary uses of database management is to store and retrieve data efficiently. Databases provide a structured framework for organizing and storing large volumes of data, allowing users to easily access and retrieve information when needed.

Another key application is data analysis, where databases enable the efficient processing and analysis of large datasets to derive meaningful insights and make informed decisions. Database management also plays a crucial role in data integration, allowing organizations to consolidate data from various sources into a single, unified view.

Additionally, database management systems include robust security features to ensure the confidentiality, integrity, and availability of data, protecting against unauthorized access and data breaches.

Finally, databases facilitate data backup and recovery processes, allowing organizations to create regular backups and restore data in the event of system failures, disasters, or data loss incidents.

Overall, database management systems provide essential tools and functionalities for effectively managing and leveraging data in various domains and industries.

For more questions on Database management

https://brainly.com/question/13266483

#SPJ8

When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as
-Microsoft Excel to keep track of magazine sales.
-Microsoft Word to write an article about the photo.
-Adobe Photoshop to manipulate the photo.
-Autodesk Maya to create 3-D images that match the photo.

Answers

Answer:

C. Adobe Photoshop To Manipulate The Photo.

Explanation:

:)

Answer:

C

Explanation:

1. When jump starting a car, make sure it is in

Answers

Answer: Make sure it is on

Explanation:

Witch of the following are true of email communications when compared to
Phone or face to face communications

Answers

The statements which are true of e-mail communications when compared to phone or face-to-face communications is that communications via e-mail are:

more difficult to determine tone or inflection.easily shared.absent of visual cues.

What is communication?

Communication can be defined as a strategic process which involves the transfer of information (messages) from one person (sender) to another (recipient or receiver), especially through the use of semiotics, symbols, signs and network channel.

What is an e-mail?

An e-mail is an abbreviation for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users exchange (send and receive) both texts and multimedia messages (electronic messages) over the Internet.

In this context, we can reasonably infer and logically deduce that in an electronic mail (e-mail) it would be more difficult to determine a person's tone or inflection in comparison with phone or face-to-face communications.

Read more on e-mail here: brainly.com/question/15291965

#SPJ1

Complete Question:

Which of the following are true of e-mail communications when compared to phone or face-to-face communications?

Communications via e-mail are _____.

absent of visual cues

more precise and accurate

limited in efficiency

less likely to be saved

easily shared

more difficult to determine tone or inflection

What weight pencil is recommended for darkening lines and for lettering? *

Answers

Answer: darkened

Explanation: darkened

Answer:

While the softer B pencils are generally considered the best for shading, there's no reason to discount the harder H pencils. The HB and H are good choices for fine, light, even shading. However, they too have drawbacks. Pencil grades from HB through H, 2H to 5H get progressively harder and are easier to keep sharp.

how OS manages the reusable resources

Answers

Answer:

Resources

A resource is anything required by a process.

Anything - os as resource manager.

Process - owns the resource.

Required - no resource, no progress; adaptive processes.

Resources - sharable, serially reusable, and consumable.

Explanation:

Resource durability determines how a resource reacts to being used. A reusable resource remains after being used. Disks, networks, CPUs are reusable resources.Oct 9, 201

What is THE GRAIN CRUSHER? ​

Answers

Answer:

Grain crusher is used to crush various kinds of grains, peas, buckwheat, beans, corn, linseed seeds and etc. Crushed grains are usually used to feed ruminant animals. Crushed grain are easier to digest, nutrients are assimilated more easily. Suitable as simply pellets chrusher.

the data link layer accepts messages from the network layer and controls the hardware that transmits them (T/F)

Answers

The data link layer accepts messages from the network layer and controls the hardware that transmits them is True.

What is OSI Model?Providing a "shared basis for the coordination of [ISO] standards development for the purpose of systems interconnection," the Open Systems Interconnection model (OSI model) is a conceptual framework. Physical, Data Link, Network, Transport, Session, Presentation, and Application are the seven separate abstraction layers into which the communications between computing systems are divided in the OSI reference model.In order to describe networked communication, the model divides the flow of data in a communication system into seven abstraction layers, starting with the physical implementation of transmitting bits across a communications medium and ending with the highest-level representation of data in a distributed application. Each intermediate layer assists the layer above it and is assisted by the layer below it in providing a class of functionality. In all programme, classes of functionality are realised.

To learn more about OSI Model refer to:

https://brainly.com/question/22709418

#SPJ4

Explaining Invalid Data
what happens if date is entered in a feld without meeting the validation mal

Answers

Answer:

An error appears and the record cannot be saved

Explanation:

edge 2021

C++
Write a program and use a for loop to output the
following table formatted correctly. Use the fact that the
numbers in the columns are multiplied by 2 to get the
next number. You can use program 5.10 as a guide.
Flowers
2
4
8
16
Grass
4
8
16
32
Trees
8
16
32
64

Answers

based on the above, we can write the C++ code as follows..


 #include <iostream>

#include   <iomanip>

using namespace std;

int main() {

     // Output table headers

   cout << setw(10) << "Flowers" << setw(10) << "Grass" << setw(10) <<    "Trees" << endl;

   // Output table rows

   for (int i = 1; i <= 4; i++) {

       cout << setw(10) << (1 << (i-1)) * 2 << setw(10) << (1 << i) * 2 << setw(10) << (1 << (i+2)) * 2 << endl;

   }

   return 0;

}

How does this work ?

Using the iomanip library's setw function, we ensure that the output of this program is properly formatted and aligned in columns. To calculate the values in each column, we iterate through every row of the table via a for loop and rely on bit shifting and multiplication.

As our code outputs these values to the console using << operators, we use endl to create new lines separating each row. The return 0; statement at the very end serves as an indication of successful completion.

Learn more about C++:

https://brainly.com/question/30905580

#SPJ1

Other Questions
Is water wet cuz I aint got no clue Evaluate to the extent that bacons rebellion can be considered as a turning point with respect to the slavery development in America. Eats ________ or ________ consumers. The records of Gemology Inc., included the following information: Net fixed assets, January 1 $ 125,000 Net fixed assets, December 31 75,000 Net sales 850,000 Gross margin 300,000 Net income 100,000 What is the fixed asset turnover ratio PLS HELP. brainliest if correct QWhat one major mistake did Hitler make when he routed the Allies in Dunkirk, France beforeconquering all of France in only four weeks? What is the equation of the line that is parallel to the given line and passes through the point (2, 2)?A. y=1/5x+4B. y=1/5x+12/5C. y=-5x+4D. y=-5x+12/5 Reduce to simplest form3/2 + ( -6/5 ) = ? MATH!! What I Have LearnedDirections: Complete the statements in the paragraph by writing the appropriatewords in the box. Refer to the word box below. Write your answers in your scienceactivity notebook. the part where no. 13 is isn't shown so I'll just type it. Pollution in air, water and soil is the result of these changes, Eventually, causing harm and (13) ______ to living things. please kindly answer these. Q.1- A 3000 cm3 tank contain O2 gas at 20 C and a gauge pressure of 2.5 x 106 Pa. Find the mass of oxygen in the tank. In a small private school, 16 students are randomly selected from eighteen available students. What is the probability that they are the four youngest students? Which of the following best describes the United States? th O It has a market economy with no government regulation. This is the only system that can work with a government run by the people O It has a command economy. A large nation like the United States needs the government to control all growth of business to prevent problems O It has a traditional economy. Most communities are focused on providing their own needs with the resources available in the local area O It has a mixed economy. The government protects individual rights, such as minimum pay for work and choices in goods and services Which statement is an opinion expressed in "Not So Fast, California!"? "And the plans to use solar electricity in California's public buildings are full of pitfalls and problems. " "Rather, California actually pays those other states to take its extra solar electricity." "In March of 2017, there were days when 40 percent of the state's electricity came from solar energy." "...A Harvard professor conducted a 12-year study on how the public viewed solar energy. ." The French and Indian War is often viewed by historians as being a factor in causing the American Revolution. Which of these BEST explains why this might be the cause? Setting up office for daily operation by turning on computers, ensuring schedules are printed, and retrieving voice mail messages. Swift, Inc. common stock is selling for $40. A dividend of $2.92 is expected to be paid next year, and earnings and dividends are expected to grow at a constant 8% per year. The return on the stock of this company is: In a penetrating wound, ________ divide to produce mobile cells that repair the dermis.A) granulation cellsB) dendritic cellsC) macrophagesD) fibroblastsE) muscle cells the standard report issued by an accountant after reviewing the financial statements of a nonissuer should state that_____ The ____________ layer of the osi model is responsible for data format translation Which of the following statements about physical fitness is TRUE?