Computer processing, Basic Computer Science

Assignment Help:

Computer Processing:

Most of the earliest computer memories have been based on physical elements which can exist in just one of the two states (on or off): such an element corresponds to one bit of information. Binary symbols are used because electronic devices can store and process them rapidly and cheaply. The physical devices used have been changed greatly,, but the principles of information representation mid manipulation within digital computers have remained essentially the same. The size of a computer can be described by the number of bits (binary digits) which its memory contains, but for most purposes larger units of storage are used to characterise machines. Generally, these are denoted by a byte which normally consists of 8 bits, and is sufficient to represent one character, and a word which can be of length -8, 16, 32 bits, is the smallest unit of storage to which most of the computer's instructions can be applied. Memories are usually described as being of a size measured in Kilobytes (K bytes) or Megabytes (M bytes). The sets or patterns of bits which make up bytes and words are used to represent all information within a computer, whether it is program instructions or data items.

The exact method of representation will vary from one machine to another, particularly with respect to instructions formats. An 8 bit byte can accommodate 256 different bit patterns and so it is sufficient to allow for most of the characters which could be required to be printed, e.g., upper and lower case letters A-Z, together with the numbers 0-9 and also a range of punctuation symbols, with allowance for non-printing characters such as end-of-line. The set of bit patterns corresponding to a set of characters is called a character code. Standard codes are ASCII  and EBCDIC. Numbers are normally represented by one or more computer words. Incase of integers, the set of 8,16, or 32 bits (as per the computer's word length) is treated as a binary integer (i.e., encoded in the notation of binary arithmetic). A real number is represented by dividing a computer word into two components: a simple decimal number (i.e., the mantissa portion) together with the power to which it must be raised (i.e., the exponent).  


Related Discussions:- Computer processing

Comparison instructions , They are used to evaluate operators, and they hav...

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Hangman, Aim This assignment is intended to assess your skills in understan...

Aim This assignment is intended to assess your skills in understanding and interpreting a moderately complex problem, designing a solution to the problem and implementing the desig

Database design, Build a database application for a sports league. Assume y...

Build a database application for a sports league. Assume your application is to keep track of teams and equipment that is checked out to teams. Explain the steps that is needed and

Explain public code archive, Question 1 Explain the various tools used for...

Question 1 Explain the various tools used for open source software development Question 2 Discuss the OSS licensing strategies Question 3 Explain the software developmen

Types of operating systems, Operating Systems:  An operating system is a se...

Operating Systems:  An operating system is a set of programs that manage computer hardware resources and provide common services for application software.  There are following kind

Introduction to laboratory organisation and management, INTRODUCTION : In ...

INTRODUCTION : In the earlier units of this block you learnt the importance of proper filing and record keeping. You are also aware that in laboratory organisation and management,

Computer Networking and configuaration, Ask queYou are hired as a Chief Tec...

Ask queYou are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begi

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Explain the types of memory and explain how each work, Problem: a) ...

Problem: a) Explain the basic functions of a computer: inputting, processing, storing and outputting. b) List four types of memory and explain how each wor

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd