Binary codes, Basic Computer Science

Assignment Help:

Binary Codes:

We have seen earlier that digital computers use signals that have two distinct values and there exists a direct analogy between binary signals and binary digits. Computers not only manipulate numbers but also other discrete elements of information. The distinct discrete quantities can be represented by a group of binary digits (known as bits). For example, to represent two different quantities uniquely two symbols are sufficient and hence one binary digit (either 0 or 1) will be sufficient to uniquely represent the two symbols. But one bit will not suffice if one has  to represent more than two quantities. In those cases more than one bits are required, i.e. the bits have to used repeatedly. For example if we have to give unique codes for three distinct items we need at least 2 bits. With two bits we can have codes 00, 01, 10 and 11. Out of this we can use first three to assign unique codes to three distinct quantities and leave the fourth one unused. In general, an n-bit binary code can be used to represent 2n  distinct quantities. Thus group of two bits can represent four distinct quantities through unique symbols 00, 01, 10 & 11. Three bits can be used to represent eight distinct quantities by unique symbols 000, 001, 010, 011, 100, 101, 110 & 111. In other words, to assign unique codes to m distinct items we need at least n bit code such that 2n >= m.   

Digital computers use binary codes to represent all kinds of information ranging from numbers to alphabets. Whether we have to input an alphabet, a number or a punctuation symbol; we need to convey it to machine through a unique code for each item. Thus, the instruction to be performed by the CPU and the input data which form the operands of the instruction are represented using a binary code system. A typical machine instruction in a digital computer system could therefore look like a set of 0s and 1s. Many binary codes are used in digital systems. BCD code for representing decimal numbers, ASCII code for information interchange between computer and keyboard, Unicode for use over Internet and Reflected (Gray) code are some commonly studied binary code systems.   


Related Discussions:- Binary codes

Computer architecture, Consider a CPU that implements two parallel fetch-ex...

Consider a CPU that implements two parallel fetch-execute pipelines for superscalar processing. Show the performance improvement over scalar pipeline processing and no-pipeline pro

Explain the protection features of ms access, Question 1 Explain the pr...

Question 1 Explain the protection features of MS Access? 2 What is Query Parameter? 3 What are the steps to be taken for improving performance of Microsoft Access database? 4 W

Fuction to delete a record in phone book in c, function to delete a telepho...

function to delete a telephone book record in c programing using struct and objects...?

Describe gamma and its importance, Question 1 Describe HSV and CMYK color ...

Question 1 Describe HSV and CMYK color models Question 2 Describe gamma and its importance Question 3 What are the steps involved in image manipulation? Que

Hypermedia, Hypermedia: When the desired webpage loads into your brows...

Hypermedia: When the desired webpage loads into your browser you will see the text comes in, the pictures arrives, the animation gets loaded and so on. You will notice that so

Briefly explain html and xml, Question 1 Briefly explain principles of eff...

Question 1 Briefly explain principles of effective navigation Question 2 Explain the terms URI and URL. Why should you use Relative URI? Question 3 What are the di

Types of pc, TYPES OF PC:  In general,  basic function of all the comp...

TYPES OF PC:  In general,  basic function of all the computers is same i.e. Computers accept data as input, perform operations on these data and generates the desired output t

Design problem, Design Problem 1. Implement a basic file system managed fr...

Design Problem 1. Implement a basic file system managed from within a file. The file system should have the following capabilities: i. List files stored along with their sizes.

Describe any five requirements of clustering in data mining, Question 1...

Question 1 What is data mining? What are the major issues in data mining? Explain 2 What is meant by data reduction? Explain any three techniques of data reduction 3 Define a b

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd