Try to derive your result algebraically

Assignment Help Basic Computer Science
Reference no: EM133218304

While on co-op at the Very Large Array in Soccorro, New Mexico, you receive a strange transmission coming from the star Vega, 25 light-years away. It is a sequence of numbers: -35, -9, -9, -1 which keeps repeating. Everyone is stumped until you suggest converting the numbers into four 8-bit 2's-complement numbers and sequencing them together to form a single 32-bit binary sequence. Have you discovered an alien intelligence? Explain your answer by identifying the resulting pattern. (Hint, write down a sequence of numbers denoting the number of sequential ones. What is this sequence? Is it likely to be naturally occuring? Recommended movie: Contact (1997). ii. While on your next assignment at the Arecibo Radio Observatory in Puerto Rico, you get the following message coming from Proxima Centauri, the closest star (other than the Sun) to Earth at 4.22 light-years. The message reads: 0, 87, 82. 114, 82, 82, 87, 0. This time a single long binary sequence doesn't work. Try stacking the 8-bit binary representations to form an 8x8 pixel array (1=ON, 0=OFF). What is the message? iii. Your fame as an exobiologist is secured! At Roswell, New Mexico, you are asked to examine a technical journal from an alien crash site. One strange equation reads: 412 + 156 = 601. Assuming this equation is correct, and their counting system is based on the number of fingers they have, how many fingers would you expect the aliens to have? Try to derive your result algebraically rather than just guessing and verifying. Let b = the base, with the digit places representing powers of b: b 0 , b 1 , b 2 , etc

Reference no: EM133218304

Questions Cloud

Artificial intelligence databases : (1) What advantages/disadvantage do artificial intelligence databases have over traditional databases.? (2) What are the ethical problems with using an artifici
Contributory grade for the business guideline : 1.identify and figure out in nuances the huge parts that appear with the implantation of The Attorney General into the business guideline consent
Ensure serializability of schedules : Locking protocols are used to ensure the isolation property of concurrently executing transactions. These techniques ensure serializability of schedules
Tlockheart with full name of tifa lockheart : Provide a single command that will add a user called "tlockheart" with a full name of "Tifa Lockheart"
Try to derive your result algebraically : Try to derive your result algebraically rather than just guessing and verifying. Let b = the base, with the digit places representing
Code containing a conditional statement : Write code containing a conditional statement that will print "Yes" if integer variable var1 is a multiple of 3 and the first character of String variable var2
How social perceptions affect developing children : The purpose of this assignment is to investigate how social perceptions and influences affect developing children
Inter-networking strategy for small and stable organization : Design and implement a multi-location, inter-networking strategy for a small and stable organization.
Pick a famous rap beef : Pick a famous rap beef, investigate both sides, and then report details of the feud in a blog post Your blog post should include links to music, videos, article

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd