Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) Represent decimal 3864 in the 2421 code. Show that the code is self-complementing by taking the 9’s complement of 3864.
 
b) Find out the value of base x if (211)x = (152)8

problem 2:

a) Perform the arithmetic operations (+42) + (-13) & (-42) - (-13) in binary using the signed – 2’s complement representation of negative numbers.
 
b) Convert (101101)2 to Gray code and Convert (1010) from Gray code to binary
 
problem 3: Convert (010110010111)2 to

a) 3 decimal digits in BCD.
b) 3 decimal digits in the excess–3 code.
c) 3 decimal digits in the 2421 code.
 
problem 4:

a) Convert the following decimal numbers to the indicated bases.

i) 7562.45 to Octal ii) 1938.257 to hexadecimal iii) 175.175 to binary
 
b) Convert the given numbers with the indicated bases to decimal (12121)3; (4310)5; (50)7 and (198)12
 
c) Perform subtraction with the following unsigned decimal nubers by taking the 10’s complement of the subtrahend.

i) 5250 – 1321 ii) 1753 – 8640 iii) 20 – 100 iv) 1200 - 250

d) Represent the following decimal numbers in BCD 13597; 93286 & 99880

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93446
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question? 


Related Questions in Computer Engineering

Let the two primes p 41 and q 17 be given as set-up

Let the two primes p = 41 and q = 17 be given as set-up parameters for RSA. 1. Which of the parameters e1 = 32,e2 = 49 is a valid RSA exponent? Justify your choice. 2. Compute the corresponding private key Kpr = (p,q,d). ...

You are designing a controller for a tiny cache that is

You are designing a controller for a tiny cache that is fully associative but has only three words in it. The cache has an LRU replacement policy. A reference record module (RRM) monitors references to the cache and alwa ...

Chapter 1 discussed four general methods for coping with

Chapter 1 discussed four general methods for coping with complexity: modularity, abstraction, hierarchy, and layering. Which of those four methods does a protocol stack use as its primary organizing scheme? Give two scen ...

1 why is hacking a big threat to system security2 what is

1. Why is hacking a big threat to system security? 2. What is the best way to deal with hacking? 3. Discuss the politics of dealing with hacktivism. 4. Following the history of hacking, can you say that hacking is gettin ...

John a 17-year-old purchased a ping-pong table and four new

John, a 17-year-old, purchased a Ping-Pong table and four new Ping-Pong paddles. A week after he turned 18, John tried to return the Ping-Pong paddles. He told the seller that he had decided to keep the table. DISCUSS, C ...

1 list and define the factors that are likely to shift in

1. List and define the factors that are likely to shift in an organization's information security environment. 2. Who decides if the information security program can adapt to change adequately? 3. List and briefly descri ...

Excel assignmentthe year 1 number of tickets sales cell c12

Excel Assignment The Year 1 "Number of Tickets Sales" (cell c12) is the same as the initial "Average Number Tickets Sold Annually" (cell c6). In Years 2 and 3, the value for "Number of Tickets Sales" will increase by the ...

Describe the difference between procedural programming and

Describe the difference between procedural programming and object-oriented programming?

How do you select the primary key from the candidate keys

How do you select the primary key from the candidate keys? How do foreign keys relate to candidate keys? Provide examples from either your workplace or class assignments.

Write a function that counts the occurrences of a word in a

Write a function that counts the occurrences of a word in a string. The function should return an integer. Do not assume that just one space separates words and a string can contain punctuation. Write the function so tha ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro