StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CSCI 108: Computer Science & Phython Midterm - Term Paper Example

Cite this document
Summary
In other words it is set of coding which does not allow specific formatting like underlined, fonts, italic or bold text. Characters 0-127 are termed as Standard ASCII Set while characters 128-…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
CSCI 108: Computer Science & Phython Midterm
Read Text Preview

Extract of sample "CSCI 108: Computer Science & Phython Midterm"

Computer Science & Python Midterm of Computer Science & Python Midterm Decimal to Binary conversion: Number is 111(111)10 = (1101111)2Explanation:64321684211101111So the binary number we require is 1101111Decimal to Hexadecimal conversion:( 777 )10 = ( 309 )16ExplanationContinually divide decimal number by 16 to give a result and a remainder. Write down the remainder (in hexadecimal).DivisionResultremainder (in dec)remainder (in hex)777 / 16489948 / 163003 / 16033So the required Hexadecimal number is 309ASCII:It is a coded representation of text in computers, and devices that operate with text.

In other words it is set of coding which does not allow specific formatting like underlined, fonts, italic or bold text. Characters 0-127 are termed as Standard ASCII Set while characters 128- 255 are termed as Extended ASCII Set.UNICODE:It is and coding standard related to the industry. UNICODE allows the text represented in any writing system of the world to be manipulated and presented. It includes around 10,000 characters, a set of encoding of characters, visual referencing coding charts, and methodology for encoding etc.

It covers almost all the languages of the world and is mostly used in operating systems, web, fonts and emails, etc.Both are related in a way that first 128 characters of UNICODE are same as ASCII.Comparing lossless and lossy compression:In lossless is a type of data compression in which each and every bit of information remains (as in the original one) after the file is uncompressed. While, lossy compression is a type pr data compression that reduces a file by permanently removing certain data, particularly redundant data.

High level programming languages besides Python:The two high level programming languages besides Python are:JAVARubyRAM and CPU:RAM or Random Access Memory is volatile memory that stores data that is waiting to be processed by the Central Processing Unit of the computer. All of the data in the RAM is lost once it is powered off. Central Processing Unit is responsible for data processing. Traveling of data starts from the hard drive then moves toward RAM and finally reached to the CPU for processing.

Difference between internet and WWW:Internet is the huge network of network through which all the networks are connected globally while World Wide Web is way for accessing data over the internet. (Morley, Parker, & Parker, 2010, p. 32-33)Algorithm:It is a step by step explanation of performing of specific task. It can be as easy as multiplication of 3 numbers and as complex as running of a compressed video.GATE in computer Engineering:It is environment for developing of writing software which can process human language text.

It is mostly used for extracting text. It helps Computer Engineers to describe and establish organizational infrastructures for processing languages, and assists the embedding of processing of language functionalities into the application.Stats for two Computer Science related fields:Computer Network Architects:According to U.S. BLS website states job opportunities for computer network architects is expected to increase by 15% from 2012 to 2022. Jobs for CNA will grow as organizations continue to increase their usage of mobile and wireless networks.

The median current salary of this position is U.S $91,000 per year or U.S $43.75 per hour. ("U.S. Bureau of Labor Statistics", n.d.)Computer Support specialist:According to U.S. BLS website states job opportunities for computer network architects is expected to increase by 17% from 2012 to 2022. Need of support staff is required when companies expand and increase their requirement of computers and related applications. A progress in the job market could be seen for computer support specialist as the organizations are moving towards cloud computing.

The median current salary of this position is U.S $48,900 per year or U.S $23.51 per hour. ("U.S. Bureau of Labor Statistics", n.d.)ReferencesComputer Network Architects : Occupational Outlook Handbook : U.S. Bureau of Labor Statistics. (n.d.). Retrieved from http://www.bls.gov/ooh/computer-and-information-technology/computer-network-architects.htm#tab-1Computer Support Specialists : Occupational Outlook Handbook : U.S. Bureau of Labor Statistics. (n.d.). Retrieved from http://www.bls.gov/ooh/computer-and-information-technology/computer-support-specialists.

htm#tab-1Morley, D., Parker, C. S., & Parker, C. S. (2010). Understanding computers: Today and tomorrow. Boston, Mass: Course Technology Cengage Learning.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CSCI 108: Computer Science & Phython Midterm Term Paper”, n.d.)
CSCI 108: Computer Science & Phython Midterm Term Paper. Retrieved from https://studentshare.org/information-technology/1633024-csci-108-computer-science-phython-midterm
(CSCI 108: Computer Science & Phython Midterm Term Paper)
CSCI 108: Computer Science & Phython Midterm Term Paper. https://studentshare.org/information-technology/1633024-csci-108-computer-science-phython-midterm.
“CSCI 108: Computer Science & Phython Midterm Term Paper”, n.d. https://studentshare.org/information-technology/1633024-csci-108-computer-science-phython-midterm.
  • Cited: 0 times

CHECK THESE SAMPLES OF CSCI 108: Computer Science & Phython Midterm

Major Knowledge Advancements in Wireless Information

We have seen computer been totally wireless from mouse to CPU everything is in our pocket.... Advancement in technology had enabled us to see what might be one of the miracles for our ancestors.... Advancement in wireless technology is one of these miracles.... But have you ever thought of a reason behind this wireless technology Inventions took place as a result of need....
3 Pages (750 words) Essay

The Representation of Data in a Computer

Write a short report with examples to show how a computer system that only works with binary data can be used to store and process multimedia data such as text, images, sound as well as numeric data. The representation of data in a computer is very different from the way it is represented in real world.... ut whatever may be the form of data , a computer recognizes only 0's and 1's and therefore a user's data needs to be converted into appropriate binary form to be able to be processed by a computer ....
14 Pages (3500 words) Essay

Professional Ethics for Computer Science

Other important virtues are fortitude, Professional Ethics for computer science September, 2006 My Ethical Perspective Ethics has been one of the most debated issues in the history of man's existence.... Having taken up a major related to computers, I feel the need for every individual who use the World Wide Web, and other computer related applications and hardware, to become responsible for their own actions.... In this age of computer technology, each and every individual must be reminded that technology is developed for the betterment of mankind, and not for the destruction of society's moral standards....
2 Pages (500 words) Essay

Comparison of PHP and Python

The PHP can be deployed on almost every operating system which can be a standalone computer system or a web server.... The Python language can be deployed to the computer system as well as the application server, moreover, a number of operating systems provide support to the Python Language....
4 Pages (1000 words) Essay

Posts Related to Computer Science

The increased developments in the technology sector have attracted increased attention to this branch of science making different authors to write articles that highlight different aspects of computer science.... This essay will give a summary of ten different posts that relate to computer science.... g… computer science is defined as a branch of science that specializes with studies that relate to computation theories and design of computers....
2 Pages (500 words) Essay

Computer Science

Each pixel both below and above are drawn thus resulting in a curve that has a thickness of 2n+1 pixel in the y axis (Drawing Lines and Curves (Introduction to computer Graphics Using Java 2D and 3D).... Bresenham's algorithm calculates the locations of the pixels in the first 45 degrees....
4 Pages (1000 words) Lab Report

Computer Science Questions

They should be… Therefore, a committee should be formed that is comprised of members from all the relevant stakeholders, including the senior management personnel computer science Questions al Affiliation) Question One Prencipe asserts that senior management cooperation is very important for the success of any project in a company.... uestion TwoWilson argues that in order to determine the threat scale during computer forensic tactics preparation, one identifies the rate of spread of the malicious program (worm, virus)....
1 Pages (250 words) Essay

Ddos Attack Classification

The author of the following text entitled "computer science" focuses on the issues of computer science.... computer science Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us