What is binary, Computer Engineering

Assignment Help:

Binary is an alternative number system which works very good for computers. Humans have ten fingers; that's probably why we use ten digits (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) in our number system (decimal), but it is simple for a computer to use only two digits (0 and 1). Ones and zeros can be shown with high or low voltage, closed or open switches, aligned or misaligned magnetic particles, etc. A byte is a group of eight bits, and it is the standard unit by which data is stored. There are 256 dissimilar combinations of zeros and ones you can make with one byte, from 00000000 to 11111111. This is sufficient to cover all the ASCII characters. If more than 256 values are required, then more than one byte can be used. With two bytes, there are 65536 possible combinations of ones and zeros. These bytes can show any kind of data. For example, a picture may be made up of thousands of pairs of bytes, with each pair of bytes signifying a single dot in one of 65536 colors. Put together all these dots (known as pixels) and you have a full-color picture (most picture data is also compressed).

 


Related Discussions:- What is binary

Define linear probing with respect to hashing technique, Define Linear Pro...

Define Linear Probing Linear Probing:  The easiest way to resolve a collision is to begin with the hash address and do a sequential search by the table for an empty location.

Self knowledge - characteristics of an experts system, An experts system ...

An experts system has knowledge that lets it reason about its own operations plus a structure that simplifies this reasoning process. For example if an expert system

Define functionality of application layer in tcp/ip protocol, Define the fu...

Define the functionality of application layer in TCP/IP protocol stack? Function of Application Layer: The top layer within the Internet reference model is the applicatio

Fundamental difference between smart card and e-cash, What is the fundament...

What is the fundamental difference between the transactions made using Smart Card and E-cash? Smart Card and E-Cash: E-cash storable smart cards can dispense and store ca

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

What is optical mark recognition, Optical mark recognition (OMR)  OMR ...

Optical mark recognition (OMR)  OMR technology scans a printed form and reads pre-defined positions (where specific fields have been filled in for instance ?-?or _); system re

Relation ship, what is relationship among objects in software engineering??...

what is relationship among objects in software engineering??

How to create dlq rules table, DLQ - Dead Letter Queue If an applicati...

DLQ - Dead Letter Queue If an application tries to put a message to one more application and if it is not delivered then it goes to the DLQ. So DLQ is not anything but all und

Explain the configuration of a step-by-step switching system, With neat dia...

With neat diagrams explains the configuration of a step-by-step switching system. The schematic diagram for an exchange is specified in figure. Each subscriber is associated to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd