How many bits will you need to represent each character

Assignment Help Basic Computer Science
Reference no: EM131187543

You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math using 40 separate characters (probably because there are 40 stripes on a zebra). They would very much like to use computers, but would need a computer to do Zebronian math, which would mean a computer that could represent all 40 characters. You are a computer designer and decide to help them. You decide the best thing is to use BCZ, Binary-Coded Zebronian (which is like BCD except it codes Zebronian, not Decimal). How many bits will you need to represent each character if you want to use the minimum number of bits?

Reference no: EM131187543

Questions Cloud

President of sales for terrafirma : You are the vice president of sales for TerraFirma, a company that manufactures outdoor sporting gear. You receive a report on your desk one morning that claims little or no relationship between the University of Michigan Consumer Sentiment Index ..
Ethics and legal malpractice : Failing to perform legal work, neglecting cases, and failing to communicate with clients make up a large number of the ethical complaints filed against attorneys. Clients, understandably, do not have a lot of patience if their lawyer misses a dead..
What business expense amount can ryan deduct : Ryan is self-employed. This year Ryan used his personal auto for several long business trips.- What business expense amount can Ryan deduct (if any) for these trips?
Why did facebook decide to make it more difficult for users : Why did Facebook decide to make it more difficult for users to control who has access to the personal information they post on the Web site?
How many bits will you need to represent each character : You decide the best thing is to use BCZ, Binary-Coded Zebronian (which is like BCD except it codes Zebronian, not Decimal). How many bits will you need to represent each character if you want to use the minimum number of bits?
Problem regarding the federal government states : The power to regulate business does not rest exclusively with the federal government states have the power to regulate transit commerce- commerce that occurs within their borders this is also called the state's police power.
Explain the widening income inequality gap : Using the sociological perspective of your choice, how might you explain the widening income inequality gap in the United States and around the world?
Requirements of business judgement rule : Adele is a director of Music Ltd. She is being sued for a breach of duty of care. She wants to argue that she utilised a business judgement. Explain to Adele the requirements of business judgement rule with reference to relevant authority.
What is the largest positive and smallest negative number : What bias should be used in the exponent if we prefer all exponents to be nonnegative? Why would you choose this bias?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Differences between data, voice, and video signals

Differences between data, voice, and video signals.  Include a description comparing the differences between a PBX and VoIP.  (200-350 words)

  Why are computer systems so vulnerable

Is security a technical issue? A business issue? Both? Support your answer. (Hint: Read Kim Nash, "Why Technology Isn't the Answer to Better Security,"CIO www cio com October 15, 2008.

  What will you suggest to mitigate these risks

Prepare a report outlining the major security threats faced by NDAS. Be sure to identify those that you think are major threats and those that are minor threats.

  Investigation of object-oriented programming by creating

We begin our investigation of object-oriented programming by creating an object-oriented program with a class called Employee. You will create two objects based on the Employee class, along with a class that contains the main method. The attributes, ..

  Creating and commercializing a new technology

There are a number of factors and precautions that need to be considered when developing and introducing new technologies to the marketplace. This is especially the case when this could be a technology without a known history. One specific considerat..

  Explain what type of attack

A person in possession of a sample of the ciphertext and the corresponding plaintext is capable of what type of attack

  Write a c program to generate a sine waveform

Write a C program to generate a sine waveform

  How do you find the dot product of two vertices

How do you find the dot product of two vertices

  What do you recommend he do about making a backup

What do you recommend he do about making a backup - The chief financial officer (CFO) of NCWR keeps a huge number of reports, spreadsheets, and other critical financial information on his computer

  How many entries are there in each of the following

The BTV operating system has a 21-bit virtual address, yet on certain embedded devices, it has only a 16-bit physical address. It also has a 2-KB page size. How many entries are there in each of the following?

  Probability-first game joe enters is fourth game of season

Joe Coledge is the third-string quarterback for the University of Alatoona. What is the probability that the first game Joe enters is the fourth game of the season?

  How analysts compute cost of information system

When the analysts compute the cost of an information system, they seldome include the cost of the employee laybor for using that system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd