• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data Representation

Extracts from this document...

Introduction

Data Representation Data Representation 1 Binary 1 Hexadecimal 1 For example: 2 Floating Point Numbers 3 The Sign 3 The Exponent 3 The Mantissa 3 Unicode 3 ASCII 3 Extended ASCII 3 Possible Errors Using Machine Language 4 Binary 4 Signed Numbers 4 Floating Point 4 Binary A computer-based system is made up of electronic circuits. These circuits carry two states, a low and a high charge this is known as binary (On 1 and Off 0 switches). Manipulating the charges can create binary numbers used within a computer system. The computer is able to perform calculations, the basis of all its operation using binary. Binary is a two digit based number system which makes it ideal for computed to use. Binary numbers can become quite long therefore humans cannot process them like computer systems so humans use Decimal's or Hexadecimal numbers. Binary is often referred to as machine language because a computer system can only understand binary or machine code. Everything in a computer is converted into binary. ...read more.

Middle

Floating Point Numbers The floating point binary storage formats used my Intel processors were standardized by the IEEE organisation. IEEE 32 bit and 64 bit. "Floating Point" refers to the decimal point. Since there can be any number of digits before and after the decimal, the point "floats". The floating-point unit performs arithmetic operations on decimal numbers. This is and example of a shorter 32 bit number. It is a three-part representation of a number that contains a decimal point. The Sign A single bit represents the sign of a binary floating-point number. A 1 bit indicates a negative number, and a 0 bit indicates a positive number. The Exponent This indicates the number of time the number is multiplied by itself. The Mantissa This is the positive fractional part of the representation of a logarithm; in the expression log 643 = 2.808 the mantissa is .808. This represents where the decimal point is. Unicode Unicode is an international character set developed for the scripts of all the languages of the world. ...read more.

Conclusion

The extended ASCII character set uses 8 bits, which gives it an additional 128 characters. The extra characters represent characters from foreign languages and special symbols for drawing pictures. Possible Errors Using Machine Language Binary Misinterpretation can problem when using binary. Numbers can become too long for humans to understand as binary is only a two base number system. This is why humans prefer to use a decimal number system. 16Bit and 32Bit binary can lead to problems if mixed together in a computers registry. If a 16Bit binary number was fed in to a 32Bit registry system the expected output will be different which could lead to many other calculation errors. Signed Numbers The representation of signed numbers presents more problems. Signed numbers have small number limits from -127 to +127. If a computer expects a signed number but and a normal binary number is inputted the overall outcome could be different than expected. Floating Point Floating Point number systems have different standards. The main standard is intel's IEEE floating point system. There are also other standards of floating point used with other processors. This can lead to confusion with storage if you change conversion methods. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Visual basic

    Timer2.Enabled = False lösch p1p = p1p + 1 Timer2.Enabled = True End If If X7.Visible = True And X8.Visible = True And X9.Visible = True Then MsgBox "Player X wins", vbOKOnly, "The End" Timer2.Enabled = False lösch p1p = p1p + 1 Timer2.Enabled = True End If 'Has Player O Won ???

  2. Different ways of data capture

    MANIPULATION AND/OR PROCESSING Modes of Processing Main modes of processing! * Batch Processing * Pseudo real time processing * Real time TRANSACTIONS Transactions are events that need to be recorded in connection with the production, sale, and distribution of goods and services.

  1. Smart Card System

    Access lists must be defined on a per-protocol basis. In other words, we should define access lists for every protocol enabled on an interface if we want to control traffic flow for that protocol. (Note: Some protocols refer to access control lists as "filters".) 4.2 Lock-and-Key Access Control Lock-and-key is a traffic filtering security feature that dynamically filters IP protocol traffic.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    address2 : STRING[30]; towncity : STRING[20]; county : STRING[20]; country : STRING[20]; postcode : STRING[7]; deleted : BOOLEAN; end; clist = ARRAY[0..arrsize] of customerrecord; TFormCustomers = class(TForm) groupaddress: TGroupBox; Label1: TLabel; Label2: TLabel; Label3: TLabel; Label4: TLabel; Label5: TLabel; Label6: TLabel; EDtowncity: TEdit; EDaddress1: TEdit; EDaddress2: TEdit; EDcounty: TEdit; EDcountry:

  1. Definition-nature of the problem solved - Car Mechanic business

    The letter once produced will be printed and sent to customers to inform them of the delay and the expected date for the job to be finished by. This shows the customer that they are not being forgotten and the business values their custom.

  2. Flexible Architectures in Communication Security Application

    output[2] = IV[0] = x[0] � key[2]; output[3] = IV[0] = x[1] � key[3]; Figure 3. The Twofish Cipher Kernel. All variables are 32-bit integers. Rotates are indicated by <<< and >>>. Lisa Wu Page 14 4/22/01 a random perturbation of each output bit with probability 50%.

  1. Internal Operations

    32 = 27 = 1 27 - 16 = 11 = 1 11 - 8 = 3 = 1 3 - 4 = 0 3 - 2 = 1 = 1 1 - 1 = 0 = 1 so 187 = 10111011 This means that hexadecimal is ( 8 + 2 + 1 )

  2. ELECTRONIC DATA INTERCHANGE

    In exploring EDI, the following questions will need to be addressed and answered: 1. What are the technical issues? 2. What are the potential benefits? 3. What are the start up and operation costs? 4. What is the current status within the company?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work