Understanding Digitalization: Bits, Bytes, and Computer Architecture
Digitalization: The Foundation of Computing
Digitalization: The process of converting information into a format that a computer can process, such as sound or images. This fundamentally involves representing data as a series of 1s and 0s. This conversion is facilitated by hardware and physical components within the computer. These components, primarily integrated digital circuits, operate in two states: on and off. This results in what is known as binary encoding, a system based on these two states.
Read MoreStudent Registration Form: Presidency University
Student Registration Form PRESIDENCY UNIVERSITY
First Name (Minimum 6 characters)*
Last Name*
Email Address*
(One email id only):
e.g. smith@gmail.com
Password (minimum 6 characters)*
Address*
Mobile No*
Gender: Male
Female
Printers: Impact vs. Non-Impact Technology Explained
Understanding Printers and Their Types
Printers are output devices used to produce permanent output on paper. Printers can be divided into two main categories:
Impact Printers
Impact printers use hammers or pins that strike against a ribbon and paper to print text. This mechanism is known as electro-mechanical. There are two main types:
Character Printers
Character printers print one character at a time and have a relatively slower speed. An example is the dot matrix printer.
Dot Matrix Printers
Dot matrix
Read MoreUML Diagrams: Sequence and Class Diagrams
Sequence Diagram
This tool is part of the UML diagrams and allows dynamic plot the sequence of steps or activities that are run on a particular use case. Elements are:
- Objects: Represented by a rectangle with the name at the bottom, a broken line which we call lifeline. On this is placed a vertical rectangle which call activities which indicates when an object is in operation.
- Messages: Represent information sent from the lifeline of an object to the lifeline of another. They can be of three different
Understanding Link Layer Networks: Protocols, Components, and Configurations
Chapter 9: Link Layer Networks
- What is the role and responsibility of the Level 2 Link Layer Network?
- What are the components addressed by the link layer so that it develops its responsibilities?
- What are the 3 types of configuration that a link can be implemented?
- What are the differences between the IP address and MAC address (Media Access Control)?
- In which part of the network protocol is Ethernet used?
- What were the reasons for the success of the Ethernet protocol compared to its competitors: Token
Binary Representation, Matrices, Algorithms, and Sorting
Binary Repartition
Binary Representation:
- Signed Magnitude: The first bit determines if the number is negative (the sign bit). The rest of the bits represent the magnitude (mantissa).
- One’s Complement: Similar to signed magnitude, but if the number is negative, all bits in the magnitude are inverted.
- Two’s Complement: Similar to one’s complement, but 1 is added to the inverted magnitude if the number is negative.
- Biased Representation: Similar to signed magnitude, but a bias is added to the target number.