lint all files
This commit is contained in:
@@ -1,4 +1,3 @@
|
||||
1)
|
||||
**a) Choose a number between 51 and 70. This will be number A. Choose another number between 80 and 120. This will be number B. Using 2’s complement 8-bit binary arithmetic, calculate number A – number B giving your answer in binary and decimal. (5 marks)**
|
||||
|
||||
Number A - 64 - 0100 0000
|
||||
@@ -9,7 +8,7 @@ Number B - 96 - 0110 0000
|
||||
| Num A | 0100 0000 |
|
||||
| Num B | 0110 0000 |
|
||||
| Flip B | 1001 1111 |
|
||||
| Add 1 | 1010 0000 |
|
||||
| Add 1 | 1010 0000 |
|
||||
|||
|
||||
| Num A | 0100 0000 |
|
||||
| Num B | 1010 0000 |
|
||||
@@ -99,4 +98,4 @@ NumberF - 223
|
||||
| OR (Hexadecimal) | 0xFF |
|
||||
| OR (Octal) | 0377 |
|
||||
|
||||
Here, I have picked two numbers, the first of which is converted to hexadecimal, and the second converted to octal using a division conversion method on the decimal value. Then I have done a bitwise operation for OR on the two binary values to get a binary value, and then converted to decimal, hexadecimal and octal - in this case it is the maximum value for each using 8 bit binary.
|
||||
Here, I have picked two numbers, the first of which is converted to hexadecimal, and the second converted to octal using a division conversion method on the decimal value. Then I have done a bitwise operation for OR on the two binary values to get a binary value, and then converted to decimal, hexadecimal and octal - in this case it is the maximum value for each using 8 bit binary.
|
||||
|
@@ -1,4 +1,4 @@
|
||||
1) **Choose a short phrase of between 50-60 characters. You could choose a website headline, song title, etc. Convert this phrase using Caesar shift encryption and a key of 5 to create your ciphertext. Carry out a cryptanalytic attack to try to work out the decryption key and plaintext. (10 marks)**
|
||||
1. **Choose a short phrase of between 50-60 characters. You could choose a website headline, song title, etc. Convert this phrase using Caesar shift encryption and a key of 5 to create your ciphertext. Carry out a cryptanalytic attack to try to work out the decryption key and plaintext. (10 marks)**
|
||||
|
||||
F1 veteran to retire and take up new role in 2024.
|
||||
|
||||
@@ -26,7 +26,7 @@ This results in a key of 5, so translating the 2nd word: ajyjwfs -> veteran. Thi
|
||||
|
||||
`K1 ajyjwfs yt wjynwj fsi yfpj zu sjb wtqj ns 2024.` -> `F1 veteran to retire and take up new role in 2024.`
|
||||
|
||||
2) Computer A sends 5 packets of data to computer B using Sliding Windows Flow Control.
|
||||
1. Computer A sends 5 packets of data to computer B using Sliding Windows Flow Control.
|
||||
- The transmission time (time to put on the network) for a packet of data is 1 'time units'
|
||||
- Transmission time for an acknowledgement is 0 ‘time units’ (they are very small)
|
||||
- The propagation time (time to travel through network) for any transmission is random (between 3 and 5 ‘time units’, you choose a random time for each packet and acknowledgement sent).
|
||||
@@ -40,7 +40,6 @@ Propagation Time = 3-5tu
|
||||
Processing Time (B) = 2tu
|
||||
Window Size = 2
|
||||
|
||||
For propagation time, I am going to use the following values:
|
||||
For propagation time, I am going to use the following values:
|
||||
( 0 = 3, 1 = 3, 2 = 4, 3 = 4, 4 = 5), and for simplicity's sake, I will mirror the propagation time there with the propagation time back for the acknowledgement.
|
||||
-
|
||||

|
||||

|
||||
|
@@ -4,4 +4,4 @@
|
||||

|
||||
- Task 1.3 (3 marks): Using absolute filenames (ones that start with a /), move the grep.txt file into the “Workshop 1” directory. cd into the “PDP” directory. Using relative filenames (.. notation ones that don't start with a /), copy the cv.txt file into the “CV” directory. cd into the “CSIL” directory. Using relative filenames ones that don't start with a /), rename the “Workshop 1” directory so it is called “Tutorial 1” Run the tree command and include images of the commands and the tree/find output. Your final output should also include your command history.
|
||||

|
||||

|
||||

|
||||
|
@@ -5,4 +5,4 @@
|
||||
3.3: Change all consoles years from the 20th century (19xx) to “antique”.
|
||||

|
||||
3.4: With lines that contain "Hybrid" append the line "Runs better when plugged into a TV."
|
||||

|
||||

|
||||
|
@@ -1,13 +1,17 @@
|
||||
## Lecture 1 (12:00)
|
||||
|
||||
IEEE-754
|
||||
|
||||
- 32 and 64 bit numbers
|
||||
- Float and double in java
|
||||
- Promotes interoperability among programming languages
|
||||
- 32 bit
|
||||
- Leftmost bit is a sign bit (0=+ve 1=-ve)
|
||||
- 8 bit exponent (127 bit unsigned binary number)
|
||||
- 23 bit mantissa _without_ the 1 infront of the binary point
|
||||
- 23 bit mantissa *without* the 1 infront of the binary point
|
||||
|
||||
### Scientific Notation
|
||||
|
||||
13.5 = 1101.1 = 1.1011x2 ^3
|
||||
2.75 = 10110.11 = 1.011011x2 ^4
|
||||
0.125 = 0.001 = 1x2 ^-3
|
||||
|
@@ -90,4 +90,4 @@ Flow Control is the mechanism that ensures the sender stops transmitting before
|
||||
- Red number = sent but no acknowledge
|
||||
- Green number = sent and acknowledged
|
||||
|
||||

|
||||

|
||||
|
@@ -1,2 +1,3 @@
|
||||
## Lecture 1 (12:00)
|
||||
### sed
|
||||
|
||||
### Sed
|
||||
|
Reference in New Issue
Block a user