What is binary, Computer Engineering

Binary is an alternative number system which works very good for computers. Humans have ten fingers; that's probably why we use ten digits (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) in our number system (decimal), but it is simple for a computer to use only two digits (0 and 1). Ones and zeros can be shown with high or low voltage, closed or open switches, aligned or misaligned magnetic particles, etc. A byte is a group of eight bits, and it is the standard unit by which data is stored. There are 256 dissimilar combinations of zeros and ones you can make with one byte, from 00000000 to 11111111. This is sufficient to cover all the ASCII characters. If more than 256 values are required, then more than one byte can be used. With two bytes, there are 65536 possible combinations of ones and zeros. These bytes can show any kind of data. For example, a picture may be made up of thousands of pairs of bytes, with each pair of bytes signifying a single dot in one of 65536 colors. Put together all these dots (known as pixels) and you have a full-color picture (most picture data is also compressed).

 

Posted Date: 4/5/2013 5:46:56 AM | Location : United States







Related Discussions:- What is binary, Assignment Help, Ask Question on What is binary, Get Answer, Expert's Help, What is binary Discussions

Write discussion on What is binary
Your posts are moderated
Related Questions
Q. What is Switched Mode Power Supply? SMPS is the unit into which electric supply from the mains is connected to your PC and this supplies DC to internal circuits. It is more

Convert the following into SOP form 1. (A+B) (B'+C) (A'+ C) 2. (A'+C) (A'+B'+C') (A+B') 3. (A+C) (AB'+AC) (A'C'+B)

A field containing currency amounts (data type CURR) must be assigned to a reference table and a reference field. Explain. As a reference table, a system having all the valid

"A datagram cannot be larger than the MTU of a network over which it is sent." Is the statement true or false? Explain with the help of a suitable example. All hardware technol

How many methods used to control traffic flowing into and out of the network by firewall? Firewalls utilize one or more of three ways to control traffic flowing into and out of

The total time to prepare a disk drive mechanism for a block of data to be read from is its ? Ans. latency plus seek time is the total time to prepare a disk drive mechanism fo

Biological Motivation : However remember there that in discussion first lecture is about how people have answered the question like: "How are we going to get an agent to proce

1. Figure 1 below shows the truth table for five different functions. Each truth table shows the inputs x1, x2 and the desired output d. (a) Write down which of these functions

GlobalFon is an international communication company, which offers international prepaid calling cards. They introduced three different types of cards, (1) AsiaFon: is cheapest for

Unification: As just above this we have said that the rules of inference for propositional logic detailed in the last lecture can also be required in first-order logic. Moreov