What is the numeric value of the string

Assignment Help Basic Computer Science
Reference no: EM13209787

Consider numbers having a binary representation consiting of aninfinite string of the form 0.yyyyyy..., where y is a k-bitsequence. For example, the binary representation of 1/3 is0.01010101... (y = 01, and k=2), while the representation of 1/5 is0.001100110011... (y = 0011, and k=4). A: Give a formula in terms of y and k for the value represented by the infinite string. Hint: Consider the effect of shifting the binary point k positions to the right. B:What is the numeric value of the string for the following values of y? Note that the value of k is implied; e.g.for case i, k=3, etc. i: 101 ii: 10101 iii: 000111

Reference no: EM13209787

Questions Cloud

Explain why vending machines are so prevalent in tokyo : Tokyo's streets are characterized by a plethora of vending machines-dispensing everything from soft drinks, candy bars, and cigarettes to magazines, personal toiletries and beer. Unlike other major cities such as New York and London.
Write a program in c++ for a server : Write a program in C++ for a server (called math solver) which solves three math problems: factorial (i.e. n!), exponent with base 2 (i.e. 2n), and cube (i.e. n3).
Discuss the special problems in developing objective : Discuss the special problems in developing objective, dependent measures in clinical research. If the results are not discussed in terms of statistical probability, Why not?
Improve any of your human relationships : Describe how critical thinking could help you improve any of your human relationships (only to the degree you are comfortable discussing them here).
What is the numeric value of the string : What is the numeric value of the string for the following values of y? Note that the value of k is implied; e.g.for case i, k=3, etc. i: 101 ii: 10101 iii: 000111
Which of the proposed mergers would not be challenged : Suppose there are 9 firms in the photographic film industry with corresponding market shares as given in the table above. Under present merger guidelines with respect to industry HHI and the change in HHI resulting from a merger
Print a header line with appropriate labels for each column : Print a header line with appropriate labels for each column. Format each data line to vertically align each column right-justified.
Jackie robinson and his legacy : How many number of copies were issued at one time when Jules Tigel wrote Baseball's Great Experiment: Jackie Robinson and his Legacy
Differences between an indictment and an information : What are the merits and downfalls of each? Which would you prefer if being charged in a criminal case? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a class that simulates an alarm clock

In addition, have both constructors set the alarm clock as off. (you will need a Boolean variable that determines whether the alarm is on or off) . The function or method you use to set the alarm will set the alarm on.

  Network lan and the wan links

Use VLSM to configure the given network LAN and the WAN links. VLSM must be used in the MOST efficient way to subnet the LAN and the WAN links. All the links between routers are WAN links.

  A graph is two-connected iff

A graph is two-connected iff, removal of any single vertex and the edges adjacent to that vertex, leaves the graph connected. How can we tell if a graph is two-connected? Explain your algorithm in English

  Collecting information for data dictionary

Pproblems generated by going directly to manager with questions regarding data dictionary entries? Describe to the team member how he can better collect information for the data dictionary.

  Write a statement that passes the value 4

1) Examine the following function header, the write an example call to the function. void showValue(int quantity)

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

  How many fragments are generated in link that has mtu

How many fragments are generated? What are values in the various fields in IP datagrams generated realted to fragmentaion?

  Create a hierarchy chart depicting the chosen situation

Create a hierarchy chart depicting the chosen situation, develop a flowchart and provide a brief explanation for it and develop an algorithm and provide a brief explanation for it.

  Alter computation of prefix function-correctly match string

if ‘_' is wild-card, then pattern ‘foo*bar*nad' can be found in ‘foofoowangbarnad'. Alter computation of prefix function to correctly match strings using KMP.

  Explain ethics of developing of system

To help counter terrorism, many countries are planning and development of computer systems that track large number of citizens and their actions. Clearly this has privacy, implications. Discuss the ethics of developing this type of system.

  Write organizational factors for benefits of new information

Write three organizational factors which can prevent a firm in completely realizing benefits of new information system, and give examples for each.

  Continue to keep a journal

Continue to keep a journal of your activities and experience of using SAP. Include a copy of your full journal as an appendix to the reflective essay.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd