How many bits were used to store each character

Assignment Help Computer Engineering
Reference no: EM132098894

Write out and Submit

The first electronic word processor, the Wang 1200, could let the user edit one line of text at a time before that text was printed or stored on a cassette tape. Each line of text was stored in 100 Bytes, and was 100 characters long.

a. How many bits were used to store each character?

b. How many different combinations of bits can you get from your answer to part a? This is the number of different symbols the Wang 1200 can have for each character in its editor

c. How many bits would it take to represent all of the lowercase letters in the Latin alphabet used for English?

d. What about upper and lower case?

e. What about all of the letters, numbers, and punctuation on your computer's keyboard? Space, Enter and Tab can all count as one symbol. Don't forget to show your work. Your answers might be different from your work partners', as some keyboards may have a few different keys.

Reference no: EM132098894

Questions Cloud

Calculate and return the tip on a restaurant bill : Write a C# function called calcTip to calculate and return the tip on a restaurant bill.
Determine whether a given number is an armstrong number : Write a WinMIPS64 / EduMips64 code to determine whether a given number is an Armstrong number.
Calculate the nth term passed into the method : Calculate the nth term passed into the method. Save the value of the term in the instance attribute.
Calculate the total costs of the meals : Create an application such that when the user clicks a button, your program will first input 2 meal prices from the user.
How many bits were used to store each character : How many bits would it take to represent all of the lowercase letters in the Latin alphabet used for English?
Calculate the result of each arithmetic expression : Write a java program to validate and calculate the result of each arithmetic Expression from input file.
Advantage of using the switch statement over : In what circumstances would a programmer use if-then-else instead of if-then? Also, What is the advantage of using the switch statement over a series.
Identify two types of software vulnerabilities : Identify two types of software vulnerabilities present in insecure software applications. Describe the vulnerability and the types of attacks it encourages.
Create variables to store values : Using java create variables to store these values. Devise with good names for these variables. In addition to creating the variables, set the values as follows:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd