Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) Represent decimal 3864 in the 2421 code. Show that the code is self-complementing by taking the 9’s complement of 3864.
 
b) Find out the value of base x if (211)x = (152)8

problem 2:

a) Perform the arithmetic operations (+42) + (-13) & (-42) - (-13) in binary using the signed – 2’s complement representation of negative numbers.
 
b) Convert (101101)2 to Gray code and Convert (1010) from Gray code to binary
 
problem 3: Convert (010110010111)2 to

a) 3 decimal digits in BCD.
b) 3 decimal digits in the excess–3 code.
c) 3 decimal digits in the 2421 code.
 
problem 4:

a) Convert the following decimal numbers to the indicated bases.

i) 7562.45 to Octal ii) 1938.257 to hexadecimal iii) 175.175 to binary
 
b) Convert the given numbers with the indicated bases to decimal (12121)3; (4310)5; (50)7 and (198)12
 
c) Perform subtraction with the following unsigned decimal nubers by taking the 10’s complement of the subtrahend.

i) 5250 – 1321 ii) 1753 – 8640 iii) 20 – 100 iv) 1200 - 250

d) Represent the following decimal numbers in BCD 13597; 93286 & 99880

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93446
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question? 


Related Questions in Computer Engineering

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

Create a class deck that represents a deck of cards your

Create a class Deck that represents a deck of cards. Your class should have the following methods: constructor Creates a new deck of 52 cards in a standard order. shuffle Randomizes the order of the cards. dealCard Retur ...

1 what is a hybrid firewall2 list the five generations of

1. What is a hybrid firewall? 2. List the five generations of firewall technology. Which generations are still in common use? 3. How does a commercial-grade firewall appliance differ from a commercial-grade firewall syst ...

1 write a statement in java that stores the port number

1. Write a statement in Java that stores the port number 62230 in a variable in Java and guarantees that the number is stored as an unsigned number. 2. A socket address is the combination of an IP address and a port numb ...

1 prove or disprove that state-based logging and

1. Prove or disprove that state-based logging and transition-based logging are equivalent if and only if the state of the system at the first transition is recorded. 2. Suppose a remote host begins the TCP three-way hand ...

Use the internet to research design flaws in cellular

Use the Internet to research design flaws in cellular networks that affect performance or security and find alternative designs that can improve capabilities. You can include anything in the cellular networks or smartpho ...

Suppose that the only way to reduce pollution from paper

Suppose that the only way to reduce pollution from paper production is to reduce output. The government imposes a tax equal to the marginal harm from the pollution on the monopoly producer. Show that the tax may raise we ...

Assignmentlego mindstorms line following algorithmlego

Assignment Lego Mindstorms Line following algorithm Lego Mindstorms have EV3 robots which can be modified to do assignments, one time or over and over. We utilize the software Lego Mindstorms which has in-fabricate alter ...

Chapter 1 discussed four general methods for coping with

Chapter 1 discussed four general methods for coping with complexity: modularity, abstraction, hierarchy, and layering. Which of those four methods does a protocol stack use as its primary organizing scheme? Give two scen ...

1 what is social engineering why do security experts worry

1. What is social engineering? Why do security experts worry about social engineering? What is the best way to deal with social engineering? 2. Humanware is a cause of security threat. Discuss why this is so. 3. Discuss ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen