Explore BrainMass
Share

Computer Systems Organization

Pinging the Default Gateway

What response do you get when you ping the default gateway?

(ref3) Tens Complement Representation

The tens complement of the decimal number X is defined to be (10 superscript N ) - X, where N is the number of decimal digits in the number. Describe the use of tens complement representation to perform decimal subtraction. Illustrate the procedure by subtracting (0326) subscript 10 from (0736)subscript 10

Packed Decimal Numbers

Please note this refer to PACKED decimal numbers. For each of the following packed decimal numbers, show the decimal value: a. 0111 0011 0000 1001 b. 0101 1000 0010 c. 0100 1010 0110

Heapsort: Heapify Elements

Consider the following definition of HEAPIFY. HEAPIFY(A, i) 1 l = LEFT(i) 2 r = RIGHT(i) 3 if l < heap-size[A] and A[l] > A[i] 4 then largest = l 5 else largest = i 6 if r < heap-size[A] and A[r] > A[largest] 7 then largest = r 8 if largest != i 9 then exchange A[i] and A[largest] 10

Information Technology Architecture

My project team at my place of employment is working a task that we (being all relatively new) are fully understanding. What we need to know is how does the information technology architecture differ from an information vision?

Fully connected graphs

Is it TRUE or FALSE that ( and why ) In an undirected graph(with no self loops), if every vertex has degree at least n/2, then the graph is fully connected ? Thanks

It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 101110.1001 - 11000.1101

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XVI) It is an explanation

It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 11011.110 - 101.001

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XV) It is an explanation of

It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 101101.0011 - 100101.0001

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XIV) It is an explanation of

It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 110011011101101 - 1010110011

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XIII) It is an explanation

Complement Representation of Numbers (XII)

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XII) It is an explanation of the Complement Repr

It is an explanation of the Complement Representation of Numbers. Subtract the given binary numerals using 1's complement and 2's complement representations for negative numbers. 110011101010 - 10110011

Computer Organization and Architecture Numerical computing Complement Representation of Numbers (XI) It is an explanation o

Complement Representation of Numbers (X)

Computer Organization and Architecture Complement Representation of Numbers (X) It is an explanation of the Complement Representation of N

Induction Problem with Fibonacci Numbers

The Fibonacci recurrence is F(0) = F(1) = 1, and F(n) = F(n-1) + F(n-2), for n > 1 The values F(0), F(1), F(2), ... form the sequence of Fibonacci numbers, in which each number after the first two is the sum of the two previous numbers. Let r = (1+ /2). The constant r is called the golden ratio and its value is about 1.62.

Complement Representation using BCD digits

I am having problems showing the ten's complement representation for (-305)10 using three BCD digits. Thanks :-)

Use of public and private keys

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decry