Explore BrainMass
Share

# Computer Systems Organization

### Pinging the Default Gateway

What response do you get when you ping the default gateway?

### (ref3) Tens Complement Representation

The tens complement of the decimal number X is defined to be (10 superscript N ) - X, where N is the number of decimal digits in the number. Describe the use of tens complement representation to perform decimal subtraction. Illustrate the procedure by subtracting (0326) subscript 10 from (0736)subscript 10

### Packed Decimal Numbers

Please note this refer to PACKED decimal numbers. For each of the following packed decimal numbers, show the decimal value: a. 0111 0011 0000 1001 b. 0101 1000 0010 c. 0100 1010 0110

### Heapsort: Heapify Elements

Consider the following definition of HEAPIFY. HEAPIFY(A, i) 1 l = LEFT(i) 2 r = RIGHT(i) 3 if l < heap-size[A] and A[l] > A[i] 4 then largest = l 5 else largest = i 6 if r < heap-size[A] and A[r] > A[largest] 7 then largest = r 8 if largest != i 9 then exchange A[i] and A[largest] 10

### Information Technology Architecture

My project team at my place of employment is working a task that we (being all relatively new) are fully understanding. What we need to know is how does the information technology architecture differ from an information vision?

### Fully connected graphs

Is it TRUE or FALSE that ( and why ) In an undirected graph(with no self loops), if every vertex has degree at least n/2, then the graph is fully connected ? Thanks

### It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 101110.1001 - 11000.1101

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XVI) It is an explanation

### It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 11011.110 - 101.001

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XV) It is an explanation of

### It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 101101.0011 - 100101.0001

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XIV) It is an explanation of

### It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 110011011101101 - 1010110011

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XIII) It is an explanation

### Complement Representation of Numbers (XII)

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XII) It is an explanation of the Complement Repr

### It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 110011101010 - 10110011

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XI) It is an explanation o

### Complement Representation of Numbers (X)

Computer Organization and Architecture Complement Representation of Numbers (X) It is an explanation of the Complement Representation of N

### Induction Problem with Fibonacci Numbers

The Fibonacci recurrence is F(0) = F(1) = 1, and F(n) = F(n-1) + F(n-2), for n > 1 The values F(0), F(1), F(2), ... form the sequence of Fibonacci numbers, in which each number after the first two is the sum of the two previous numbers. Let r = (1+ /2). The constant r is called the golden ratio and its value is about 1.62.

### Complement Representation using BCD digits

I am having problems showing the ten's complement representation for (-305)10 using three BCD digits. Thanks :-)

### Use of public and private keys

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decry