Computer Science - Essay Example

Only on StudentShare

Extract of sample
Computer Science

The methods for doing the same are described as below.
Textual information like a file or a document comprises of a collection of numbers, characters and special characters for example punctuation marks and symbols. A computer uses the following procedures for the conversion of Text to binary
Decimal numbers are the numbers whose base is 10 i.e. it uses ten digits (0 to 9) to represent the values, while binary is the number system whose base is two, it uses 0's and 1's to represent the numbers.
Each binary bit has a position assigned to it. The zeroeth position is assigned to the least significant position on the right most side. The 0 or 1 at the respective position is then multiplied by the corresponding power of two to obtain its decimal equivalent i.e. A digit at Kth position is multiplied by 2 ^(k-1). For example
Real numbers may be put into binary scientific notation: a x 2^b .The number to the right of decimal part must be multiplied by negative powers two of the corresponding position .The number to the left hand side must be multiplied by the positive powers of two. Mantissa and exponent are then stored .For example
Each and every character, symbol or punctuation mark is mapped to a corresponding decimal number .For example letter K is mapped to number 75, the number is then encoded by using ASCII code to a string of Binary numbers. ...
Download paper


1. Write a short report with examples to show how a computer system that only works with binary data can be used to store and process multimedia data such as text, images, sound as well as numeric data.
The representation of data in a computer is very different from the way it is represented in real world…
Author : sbreitenberg

Related Essays

Computer Science Research Proposal
Our company stands to gain by creating a smart and easy-to-use debugger. It will make the process of programming swifter and more efficient, leading to both profits by selling the debugger and savings by creating a more efficient software engineering process for ourselves....
7 pages (1757 words) Essay
Computer Science College Essay
Even such things as warfare, terrorism and crime can be committed with the use of information systems and tools; these of which post an ominous threat to the privacy of users. The United States, with its highly networked infrastructure, is perhaps both the most powerful and the most vulnerable in this situation. The Pentagon is expected to suffer about two million information attacks this year and alone, and business losses to cyber crime, though difficult to measure precisely, total in the billions of dollars each year. The aim of this paper is to discuss all of this, as well as any and all...
4 pages (1004 words) Essay
Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect own information systems at the expense of employees privacy. This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software,...
3 pages (753 words) Essay
Logics in Computer Science
For Peter, he complains of pain and expands down the tree to aspirin. Aspirin aggravates peptic ulcer, so that tree is not possible. The next option is alcohol for pain and that is possible. Second, he also complains of diarrhoea and does not have impaired liver function, so lomotil is administered. Recommended(peter, alcohol+lomotil). Similarly, for Mary: recommended(mary, aspirin) - no medicine for diarrhoea. For Frank: recommended(frank, aspirin+lomotil).
4 pages (1004 words) Essay
Computer Science
This original movement raised out of the hard work of a multiplicity of people who contracted with software engineering process in the 1990s, found them deficient, and looked for an innovative procedure to software development (Abrahamsson et al., 2002). The majority of the ideas were not bright; undoubtedly a lot of people thought that a great deal of successful software had been constructed that technique for an extended time. There was, though, an observation that these thoughts had been muffled and not been pleasured perilously adequate, mainly by people paying attention in software...
10 pages (2510 words) Essay
A Computer Science Life
This is true that as a computer science major, I would envision success if I am hard working and committed to the cause of knowing more and more with the changing times. This is significant because it would teach me the basics to know about computer science and in essence the varied technological manifestations. My desire would be to reach the top with consummate ease but for that I would leave no stone unturned and read a lot of books, journals and technology-related magazines to stay abreast of the changing trends within computer science and the linked technological areas. In short, I will...
4 pages (1004 words) Research Paper
Got a tricky question? Receive an answer from students like you! Try us!