Binary and data representation, Operating System

Assignment Help:

  Computing uses three number bases:- Binary (base 2), Octal (base 8) and Hexadecimal (base 16). Binary has been described before, although various catchphrases are used to describe their length.

4 bits    e.g. 1100 is termed nibble
 
8 bits    e.g. 11001111 us termed Byte
 
16 bits e.g.  1100111111001111   is termed Word
 
32 bits e.g. 11001111110011111100111111001111    is termed long word.
 
Hexadecimal (Hex) is a common base; it uses 0 -> 9 and A -> F for 10 -> 15. Conversion to decimal is achieved by using weighted columns of 16n similar to binary. Within microprocessors we often convert from binary to hex and back, a short hand way of doing this is shown below.


Related Discussions:- Binary and data representation

Build a vigorous distributed system, Q.  To build a vigorous distributed sy...

Q.  To build a vigorous distributed system you must know what kinds of failures can occur. a. List three possible kinds of failure in a distributed system. b. State which of

What are the operations of processes, What are the operations of processes?...

What are the operations of processes? Process creation A process may create several new processes. The creating process is called as parent process, where as the new proce

Android operating system, Android operating system is an open source, Linux...

Android operating system is an open source, Linux-based Smartphone OS. It is the world's most popular mobile platform with more than 700,000 applications and 25 billion downlo

Explain the fork function, Explain the Fork Function Fork function caus...

Explain the Fork Function Fork function causes a new process to be created. The calling progress is duplicated as an exact copy (called the child process) that differs only in

Model, list trhe various classification of model and types?

list trhe various classification of model and types?

Define approaches that require knowledge of the system state, Define approa...

Define approaches that require knowledge of the system state?  Answer: Deadlock detection, Deadlock prevention, Deadlock Avoidance.

Define overflow chaining, Define Overflow Chaining Another method will ...

Define Overflow Chaining Another method will divide the pre-allocated table into two sections: the primary area to determine which keys are mapped and an area for collisions, g

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd