Computer Science

College
Essay
Miscellaneous
Pages 13 (3263 words)
Download 0
1. Write a short report with examples to show how a computer system that only works with binary data can be used to store and process multimedia data such as text, images, sound as well as numeric data.
The representation of data in a computer is very different from the way it is represented in real world…

Introduction

The methods for doing the same are described as below.
Textual information like a file or a document comprises of a collection of numbers, characters and special characters for example punctuation marks and symbols. A computer uses the following procedures for the conversion of Text to binary
Decimal numbers are the numbers whose base is 10 i.e. it uses ten digits (0 to 9) to represent the values, while binary is the number system whose base is two, it uses 0's and 1's to represent the numbers.
Each binary bit has a position assigned to it. The zeroeth position is assigned to the least significant position on the right most side. The 0 or 1 at the respective position is then multiplied by the corresponding power of two to obtain its decimal equivalent i.e. A digit at Kth position is multiplied by 2 ^(k-1). For example
Real numbers may be put into binary scientific notation: a x 2^b .The number to the right of decimal part must be multiplied by negative powers two of the corresponding position .The number to the left hand side must be multiplied by the positive powers of two. Mantissa and exponent are then stored .For example
Each and every character, symbol or punctuation mark is mapped to a corresponding decimal number .For example letter K is mapped to number 75, the number is then encoded by using ASCII code to a string of Binary numbers. ...
Download paper
Not exactly what you need?

Related papers

Computer Science Research Proposal
Our company stands to gain by creating a smart and easy-to-use debugger. It will make the process of programming swifter and more efficient, leading to both profits by selling the debugger and savings by creating a more efficient software engineering process for ourselves.…
Computer Science College Essay
Even such things as warfare, terrorism and crime can be committed with the use of information systems and tools; these of which post an ominous threat to the privacy of users. The United States, with its highly networked infrastructure, is perhaps both the most powerful and the most vulnerable in this situation. The Pentagon is expected to suffer about two million information attacks this year and…
Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect…
Logics in Computer Science
For Peter, he complains of pain and expands down the tree to aspirin. Aspirin aggravates peptic ulcer, so that tree is not possible. The next option is alcohol for pain and that is possible. Second, he also complains of diarrhoea and does not have impaired liver function, so lomotil is administered. Recommended(peter, alcohol+lomotil). Similarly, for Mary: recommended(mary, aspirin) - no medicine…
Computer Science: The Underlying Processes
We have seen computer been totally wireless from mouse to CPU everything is in our pocket. So the time is not very far when we will truly have technology in our pocket.…
Computer Science: Professional Ethics Essay
Unfortunately people most related to it i.e. the computer professionals have started misusing this excellent media. The problem is accelerating at huge pace and has become a matter of concern for organizations all over the world.…
Computer Science
The methods for doing the same are described as below.…