Preview

Labs 1.1-1.4

Satisfactory Essays
Open Document
Open Document
586 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Labs 1.1-1.4
Homework Labs 1.1 - 1.4 Thursday 8:30-12:30 6/25/2013
Exercise 1.1 Base 10
Mapping for decimal number 2931
10^3 10^2 10^1 10^0
2 9 3 1
2x1000=2000 + 9x100=900 + 3x10=30 + 1x1=1 = 2931

Exercise 1.1.2
Mapping for binary number 110 base 2
4 2 1
* * *
1 1 0
= = =
4 + 2 + 0= 6

Exercise 1.1.3
Mapping for binary number 11 base 2
2 1
* *
1 1
= =
2 + 1= 3

Exercise 1.1.4
Mapping for binary number 10010 base 2
16 8 4 2 1
* * * * *
1 0 0 1 0
= = = = =
16 + 0 + 0 + 2 + 0= 18

Exercise 1.1.5
Mapping for binary number 11100010 base 2
128 64 32 16 8 4 2 1
* * * * * * * *
1 1 1 0 0 0 1 0
= = = = = = = =
128 64 32 0 0 0 2 0= 226

Exercise 1.1.6
Binary conversion for decimal 156 base 10

156-128=28-16=12-8=4-4=0
128 64 32 16 8 4 2 1
1 0 0 1 1 1 0 0

Exercise 1.1.7
Binary conversion for decimal 255

255-128=127-64=63-32=31-16=15-8=7-4=3-2=1-1=0
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 `1

Exercise 1.1.8
Binary conversion for decimal 200

200-128=72-64=8-8=0
128 64 32 16 8 4 2 1
1 1 0 0 1 0 0 0

Lab 1.1 Reviews
1) Convert the decimal value 127 to binary.

127-64=63-32=31-16=15-8=7-4=3-2=1-1=0
64 32 16 8 4 2 1
1 1 1 1 1 1 1

2) Explain why values 10 base 2 and 0010 base 2 are equivalent- Two digits start over, and next digit to convert from a base 10 integer numeral to its base 2 equivalent.
3) When you multiply 2 by the power of you get 1,2,4,8,16,32 etc.
4) It wouldn’t be that difficult you just have to ally the correct formulas.

Exercise 1.2.1
Binary addition for 110 base 2 + 1001 base 2
1 0 0 1 + + +
1 1 0 = = =
1 1 1 1

Exercise 1.2.2
Adding binary 110 base 2 + 101 base 2

1 1 0
+ + +
1 0 1 = = =
1 1 1 1 One plus one means you carry the one its one zero not 10

Exercise 1.2.3
Adding binary 111 base 2 and 111 base 2

Carry 1 1
1 1 1
+ + +
1 1 1 = = =
1 1 1 0 one plus one

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 11 70-680

    • 578 Words
    • 3 Pages

    Take a screen shot of the Event Viewer console, showing the Critical & Warning custom view, by pressing Ctrl+Prt Scr and then paste the resulting image into the Lab11_worksheet file in the page provided by pressing Ctrl+V.…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2.09 Lab Questions

    • 274 Words
    • 2 Pages

    QUESTION 2.1: Do you expect heat to flow into or out of the cup into the surrounding atmosphere?…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2

    • 310 Words
    • 2 Pages

    Question 1: What is the name of the computer you are working from? The Name of the computer is W2K8xx…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 3 a&p 1

    • 2222 Words
    • 26 Pages

    Review Sheet Results
1. Describe two variables that affect the rate of diffusion.
Your answer:
Increasing the number of membrane carriers and the concentration.…

    • 2222 Words
    • 26 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    lab 1

    • 636 Words
    • 3 Pages

    Are there any safety concerns associated with this exercise? If so, list what they are and what precautions should be taken.…

    • 636 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    The shielding also makes the cable heavier and stiffer. Thus, it is more difficult to handle.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Unit Lab 1

    • 421 Words
    • 18 Pages

    1.) Write out the powers starting from 20 to 26. Next place the values of the powers below. In each block below enter a one subtract that value from the number 127 until you have nothing remaining and all values equal 127.…

    • 421 Words
    • 18 Pages
    Satisfactory Essays