Preview

CTR 212 Assignment 2

Powerful Essays
Open Document
Open Document
818 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CTR 212 Assignment 2
Name: Christopher Haney
College ID:0543404
Thomas Edison State College
CTR-212
Semester and year:Nov14

Written Assignment #2

Review Questions:

1.Convert each of the binary numbers to decimal numbers:
A. 2
B. 4
C. 7
D. 11
E. 12
F. 18
G. 21
H. 31
I. 205
J. 227

2.Convert each of the decimal numbers to binary:
A. 111
B. 10011
C. 11100
D. 101110
E. 111001
F. 1010110
G. 1011110
H. 1110000
I. 10010100
J. 11100110

3.Convert each of the octal numbers to decimal numbers:
A. 30
B. 68
C. 80
D. 142
E. 240
F. 846

4.Convert each of the octal numbers to binary numbers:
A. 111100
B. 1011000
C. 10101000
D. 1101001000
E. 10101101001
F. 10110011100

5.Convert each of the hexadecimal numbers to decimal numbers:
A. 90
B. 199
C. 2485
D. 422

6.Convert each of the hexadecimal numbers to binary numbers:
A. 01001100
B. 11101000
C. 011011010010
D. 001100011011

7.Convert each of the decimal numbers to BCD:
A. 0001 0100 0110
B. 0011 1000 1001
C. 0001 0110 0111 1000
D. 0010 0101 0000 0010

8. What is the most important characteristic of gray code?
Gray code does not use position weighting. Only one bit changes at a time, so the speed of transition is considerably faster than other codes.

9. What makes the binary system so applicable to computer systems?
Digital circuits can easily distinguish between two voltage levels, which can be related to the binary digits 1 and 0. Therefore, the binary system can easily be applied to PLCs and computer systems.

10.Define the following:
A. Bit- Each digit of a binary number
B. Byte- A group of 8 bits
C. Word- A group of two or more bytes
D. LSB- The digit that represents the smallest value.
E. MSB- The digit that represents the largest value.

11. State the base used for each:
A. Octal-8
B. Decimal-10
C. Binary-2
D. Hexadecimal-16

13. Explain the difference between the 1's compliment of a number and the 2's compliment.
In 1's complement a negative number is represented by taking all the bits in the positive number and inverting

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Following the two scenarios where if one bit is converted and results in the same received pattern +-0+-0-+…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2.What number does a bit that is turned on represent? What number does a bit that is turned off represent? On is 1 and Off is 2…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rsm 230 Assignment 1

    • 531 Words
    • 3 Pages

    i) 91 Day Treasury Bill – it is a government issued debt obligation that matures in 91 days. It is sold at a discount and the buyer is paid the face value at maturity. The yield is the difference between the discounted price and the face value.…

    • 531 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 431 Words
    • 2 Pages

    7. Convert the While loop in the following code to a Do-While loop: int x;…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ii) Why did you select it? This is the number closest to 1 or negative 1…

    • 258 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cis 210 Assignment 1

    • 917 Words
    • 4 Pages

    Information systems standardize and enforce rules on business transactions, which helps to ensure quality of both service and process. IS informs management of a business' health, mid-level managers of department needs and planning, employees of standard operating procedures, and customers of business services. IS also provides numerous communications tools for all levels of business, both for quicker collaboration and asynchronous discussions.…

    • 917 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Equity is money that belongs to the owner or owners and investors after all debts in relation…

    • 659 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Assignment 3

    • 409 Words
    • 2 Pages

    Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays