Preview

CTR 212 Assignment 2

Powerful Essays
Open Document
Open Document
818 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CTR 212 Assignment 2
Name: Christopher Haney
College ID:0543404
Thomas Edison State College
CTR-212
Semester and year:Nov14

Written Assignment #2

Review Questions:

1.Convert each of the binary numbers to decimal numbers:
A. 2
B. 4
C. 7
D. 11
E. 12
F. 18
G. 21
H. 31
I. 205
J. 227

2.Convert each of the decimal numbers to binary:
A. 111
B. 10011
C. 11100
D. 101110
E. 111001
F. 1010110
G. 1011110
H. 1110000
I. 10010100
J. 11100110

3.Convert each of the octal numbers to decimal numbers:
A. 30
B. 68
C. 80
D. 142
E. 240
F. 846

4.Convert each of the octal numbers to binary numbers:
A. 111100
B. 1011000
C. 10101000
D. 1101001000
E. 10101101001
F. 10110011100

5.Convert each of the hexadecimal numbers to decimal numbers:
A. 90
B. 199
C. 2485
D. 422

6.Convert each of the hexadecimal numbers to binary numbers:
A. 01001100
B. 11101000
C. 011011010010
D. 001100011011

7.Convert each of the decimal numbers to BCD:
A. 0001 0100 0110
B. 0011 1000 1001
C. 0001 0110 0111 1000
D. 0010 0101 0000 0010

8. What is the most important characteristic of gray code?
Gray code does not use position weighting. Only one bit changes at a time, so the speed of transition is considerably faster than other codes.

9. What makes the binary system so applicable to computer systems?
Digital circuits can easily distinguish between two voltage levels, which can be related to the binary digits 1 and 0. Therefore, the binary system can easily be applied to PLCs and computer systems.

10.Define the following:
A. Bit- Each digit of a binary number
B. Byte- A group of 8 bits
C. Word- A group of two or more bytes
D. LSB- The digit that represents the smallest value.
E. MSB- The digit that represents the largest value.

11. State the base used for each:
A. Octal-8
B. Decimal-10
C. Binary-2
D. Hexadecimal-16

13. Explain the difference between the 1's compliment of a number and the 2's compliment.
In 1's complement a negative number is represented by taking all the bits in the positive number and inverting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ii) Why did you select it? This is the number closest to 1 or negative 1…

    • 258 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Following the two scenarios where if one bit is converted and results in the same received pattern +-0+-0-+…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    comm 450 assignment 1

    • 907 Words
    • 4 Pages

    b) Kleinberg Corporation was sued by a customer for product liability. The customer sought damages of $1,500,000. At the its December 31, 2012, year-end, the company obtained an opinion from their lawyers that the customer had a 75% likelihood of winning the suit with the damages likely to be assessed in the range of $800,000 to $1,200,000. Legal costs were estimated to amount to a further $150,000. In late January, before the company’s financial statements had been finalized, the company settled the claim with the customer for $800,000. The lawyers estimated their fees to be reduced to $80,000 because the matter was settled without going to court.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The bit pattern 1011 in 1’s complement notation is 7. The result of 7 – 2 using 2’s complement notation is 8. The bit pattern 1110 in 2’s complement notation is 9. The range of numbers that can be represented using the Excess-2N-1 notation is _________.…

    • 4533 Words
    • 19 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2.What number does a bit that is turned on represent? What number does a bit that is turned off represent? On is 1 and Off is 2…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rsm 230 Assignment 1

    • 531 Words
    • 3 Pages

    i) 91 Day Treasury Bill – it is a government issued debt obligation that matures in 91 days. It is sold at a discount and the buyer is paid the face value at maturity. The yield is the difference between the discounted price and the face value.…

    • 531 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cis 210 Assignment 1

    • 917 Words
    • 4 Pages

    Information systems standardize and enforce rules on business transactions, which helps to ensure quality of both service and process. IS informs management of a business' health, mid-level managers of department needs and planning, employees of standard operating procedures, and customers of business services. IS also provides numerous communications tools for all levels of business, both for quicker collaboration and asynchronous discussions.…

    • 917 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Equity is money that belongs to the owner or owners and investors after all debts in relation…

    • 659 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Assignment 3

    • 409 Words
    • 2 Pages

    Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ctlls Assignment 003

    • 1305 Words
    • 6 Pages

    Assessments are used so that we can check that learning has taken place and to what extent. I use assessments at all stages of the learning process in line with organizational requirements.…

    • 1305 Words
    • 6 Pages
    Good Essays