Question

In: Computer Science

1. Many operating systems now operate on 64 bits of memory. What is the highest base...

1. Many operating systems now operate on 64 bits of memory. What is the highest base 10 number it could store?

2. How many bits would you need to store the number 8,000,000?

3. How many bits is 5 Gigabytes?

4. In order to get back the original signal without distortion I must sample at _____________ the highest frequency in the signal.

a. at least 2 times

b. exactly

c. exactly 2 times

d. at least half

Solutions

Expert Solution

Ans 1. For unsigned numbers

For 3 bits, the highest number which could be stored is 7 i.e. 111 in binary

For 4 bits, it is 15 i.e. 1111 in binary

Similarly for 64 bits, 264 - 1 (= 18,446,744,073,709,551,615) is the highest base 10 number it could store

Ans 2. 23 bits

Using the same logic from before, we take floor(log2(n)) + 1 as the number of bits

Suppose, we have to calculate for 7

floor(log2(7)) = 2

2 + 1 = 3 bits

Now suppose we have to calculate for 8

log2(8) = 3

floor(log2(8)) = 3

3 + 1 = 4 bits

Ans 3.

5 Gigabytes = 5 * 230 * 8 bits or 42949672960

Explanation: 1 byte = 8 bits

1 Kilobyte = 1024 bytes or 2^10 bytes

1 Megabyte = 1024 Kilobytes or 2^20 bytes

1 Gigabyte = 1024 Megabytes or 2^30 bytes

Note: Some manufacturers use 1 KB = 1000 bytes, 1 MB = 1000 KBs and so on

Ans 4. a) At least 2 times

Refer to Nyquist-Shannon Sampling Theorem. If the frequency is lower than that(The Nyquist frequency), aliasing will occur which is like folding or overlapping of the upper frequency region resulting in distortion.


Related Solutions

A 64 bit computer uses a memory of 32KB. Work out the number of bits of...
A 64 bit computer uses a memory of 32KB. Work out the number of bits of AR, DR, PC, AC, and the HEX code of the address of last memory location. b) The memory attached to a processor has access time of 400ns. When a cache memory is introduced in the system, it is found that on average the access time for the computer was 30% greater than the cache access time for a miss ratio of 0.10. Work out...
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For...
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For PC absolute addressing, describe how to write assembly program to jump to code located in a different program memory page.
Assume a 222 byte memory: a. What are the lowest and highest addresses if memory is...
Assume a 222 byte memory: a. What are the lowest and highest addresses if memory is byte-addressable? b. What are the lowest and highest addresses if memory is word-addressable, assuming a 16-bit word? c. What are the lowest and highest addresses if memory is word-addressable, assuming a 32-bit word? Explain with Steps please
Outline the objectives and functions of memory management in operating systems. Compare and contrast the physical...
Outline the objectives and functions of memory management in operating systems. Compare and contrast the physical address space with the virtual address space as they relate to differenct memory mapping techniques in operating systems. Create a concept map the logically arrange the essential concepts about memory management into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship...
Part#1 What are the default username and password for Kali Linux? How many bits is the...
Part#1 What are the default username and password for Kali Linux? How many bits is the MD5 hashing algorithm? How many bits is the SHA1 hashing algorithm? Which hashing algorithm is more accurate, MD5 or SHA1? Part#2 What is the command to unmount a partition? In what directories are mount points typically created on Linux? When the ls –l command is used, what is designated in the first column to indicate a file? When the ls –l command is used,...
For the operating systems game, let us now assume the intrinsic superiority of Mac is not...
For the operating systems game, let us now assume the intrinsic superiority of Mac is not as great and that network effects are stronger for Windows. These modifications are reflected in different payoffs. Now, the payoff from adopting windows is (50 x W) and from adopting Mac is (15+ 5 x M); n consumers are simultaneously deciding between Windows and Mac. A. Find all nash equilibria. B. With these new payoffs, let us now suppose that a third option exists,...
Assume there is a large firm operating in the telecommunications sector. For many years now, this...
Assume there is a large firm operating in the telecommunications sector. For many years now, this firm has reported very large earnings in its income statement, which has not gone unnoticed. In particular, the media has been very quick to criticise the level of the firm’s reported earnings. However, in the current year, the firm reports a significantly lower earnings than previous years. Required Referring to your lecture notes, discuss a hypothesis (or an argument) that you are familiar with...
what is Cloud and IoT Operating Systems ?
what is Cloud and IoT Operating Systems ?
1) Using IEEE 754 format, determine the number this represents: (64 bits)     0 11000111010 1100110000000100000000000000100000000000000000000000 2) Using...
1) Using IEEE 754 format, determine the number this represents: (64 bits)     0 11000111010 1100110000000100000000000000100000000000000000000000 2) Using complement two: a) Represent 127 b) 127 – 499 3) How many nibbles can fit in three Word? 4) Using complement one: a) What number represents 10001111?
OS(Operating Systems) [3] (a) Define DMA (Direct Memory Access).       (b) An input device can transmit 100...
OS(Operating Systems) [3] (a) Define DMA (Direct Memory Access).       (b) An input device can transmit 100 characters every 4 mils 10 , if the CPU needs 2 mics to service the             Interrupt. How much time is left for asynchronous I/O. What if it can transmit 1000 characters             every 4 mils and the CPU also needs 2 mics for the service routine.             What do you think? Explain your answer in details. [4]  (a) What is the interrupt types? Give examples.                 (b)...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT