Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Number systems
Consider a decimal number: 7654.32
Short hand for: 7 * 103 + 6*102 + 5* 101 + 4*100 + 3*10-1 + 2*10-2
Likewise binary number: 1011.011
In full: 1*23 + 0*22 + 1* 21 + 1*20 + 0* 2-1 + 1* 2-2 + 1*2-3
In general the number: x2 x1 x0 . x-1 x-2 x-3
In base B is equal to: x2 B2 + x1 B1 + x0 B0 + x-1 B-1 + x-2 B-2 + x-3 B-3
Conversion table.
Decimal (Base 10)
Binary (Base 2)
Octal (Base 8)
Hexadecimal (Base 16)
0
0000
00
1
0001
01
2
0010
02
3
0011
03
4
0100
04
5
0101
05
6
0110
06
7
0111
07
8
1000
10
9
1001
11
1010
12
A
1011
13
B
1100
14
C
1101
15
D
1110
16
E
1111
17
F
Convert decimal to binary by repeated division by two.
e.g. 2510 in binary?
25
2 =
remainder 1
remainder 0
Read remainders from bottom up.
Convert decimals less than one to binary by repeated multiplication by two.
e.g. 0.62510 in binary?
0.625
1.25
whole number 1
0.25
0.5
whole number 0
1.0
Read whole numbers from top down.
Therefore 25.62510 = 11001.1012
Explain the mechanidm of the rusting of iron on the basis of electrochemical corrosion?
Explain MIB (Management Information Base) variables. MIB is a set of named items which an SNMP agent knows. To control or monitor a remote computer, a manager should fetch or s
A interrupt that can be turned off by the programmer is called as Maskable interrupt.
Your shell must accept a change directory command. This will be in the form: cd path where cd is the change directory command and the path is what you will change the direct
Explain about the network level in detail. Network Level Firewall/Packet Filters: At the Network level firewalls operate upon the mechanism of filtering individual IP pa
What are the General Security Issues Many issues exist when linking a computer system to the Internet or indeed to an external link via a network set up. There are numerous way
Address symbol table is generated by the (A) memory management software. (B) assembler. (C) match logic of associative memory. (D) generated by operating system
Array is a pointer-to-pointer-to-int: at the first level, it points to a block of pointers, one for each row. That first-level pointer is the first one we allocate; it has nrows e
Control Dependence Segments or Instructions in a program can include control structures. So, dependency among statements is able to be in control structures also. However the
In multiprocessing several processors require to communicate with one another. So synchronisation is needed between them. The correctness and performance of parallel execution reli
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd