What is data representation, Computer Networking

Assignment Help:

Q. What is Data Representation?

Information Today arrives in different forms such as numbers, text, images, audio and video.

Text: Represented like a bit pattern a sequence of bits 0s or 1s. Different codes are utilized

- ASCII (7 bits per symbol)

- Extended ASCII (8 bits per symbol)

- Unicode (16 bits - supports different languages)

- ISO (32 bits)

Data Representation (2)

Numbers

- Converted to a binary number to make simpler the mathematical operations

Images

- Symbolized by bit patterns

- Every pixel is assigned a bit pattern

- Black/ White Image 1 bit per pixel

- Gray scale images depends on numeral of levels in gray scale

- Color images: every pixel has 3 bit patterns (RGB)

Audio / Video

- Converted in to Analog and Digital


Related Discussions:- What is data representation

Traffic light is an example of what type of mechanism, Illustrate a traffic...

Illustrate a traffic light is an example of what type of mechanism Ans) A Traffic light is an example of flow control.

What is raid in ccna, A method used to standardize and categorize fault-tol...

A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

The forall statement, The FORALL Statement The FORALL statement allows ...

The FORALL Statement The FORALL statement allows for more common assignments to sections of an array. A FORALL statement has the general form.               FORALL ( triplet

Metrics are used by routing protocols, What metrics are used by routing pro...

What metrics are used by routing protocols to verify the best path?

Command to view the configuration-register value, Recognize the command to ...

Recognize the command to view the configuration-register value Ans) show version is the command to view the configuration-register value

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Explain the different types of physical networking, Question 1 Explain the...

Question 1 Explain the different activities carried out on E-Commerce, with appropriate examples Question 2 Explain the core components of E-Commerce in detail with appropria

Original classes of ip addresses, The original IP address procedure divides...

The original IP address procedure divides host addresses into three base classes. The class of an address calculates the boundary between the network suffix and prefix. The origina

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Reliable data transfer - transport layer, Reliable Data Transfer Figur...

Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd