Essentials of Computer Organization and Architecture
Essentials of Computer Organization and Architecture
5th Edition
ISBN: 9781284123036
Author: Linda Null
Publisher: Jones & Bartlett Learning
Expert Solution & Answer
Book Icon
Chapter 2, Problem 3E

Explanation of Solution

a)

Converting 137 base 10 to base 3 using subtraction method:

Step 1:

Check the possibility of multiplying any integer with the powers of 3 which may result in lower number than 137. The number that can be subtracted from the given number 137 with the power of 3 is 81. The number 81 is less than 137. So subtract 81 from 137.

137-81=34x1------------56

Step 2:

The number that can be subtracted from the given number 56 with the power of 3 is 27 and it should be multiplied by 2 in order to get the nearest number of 56. The number 54 is less than 56. So subtract 56 from 54.

56-54=33x2------------2

Step 3:

Take 3 to the power of 2 that is 9. The number 9 is greater than 2. So make the value as 0.

2-0=32x0------------2

Step 4:

Take 3 to power of 1 that is 3

Explanation of Solution

b)

Converting 248 base 10 to base 5 using subtraction method:

Step 1:

Check the possibility of multiplying any integer with the powers of 5 which may result in lower number than 248. The number that can be subtracted from the given number 248 with the power of 5 is 125. The number 125 is less than 248. So subtract 125 from 248.

248-125=53x1------------123

Step 2:

The number that can be subtracted from the given number 123 with the power of 5 is 25 and it should be multiplied by 4 in order to get the nearest number of 123. The number 100 is less than 123. So subtract 100 from 123.

123-100=52x4------------23

Step 3:

The number that can be subtracted from the given number 23 with the power of 5 is 5 and it should be multiplied by 4 in order to get the nearest number of 23

Explanation of Solution

c)

Converting 387 base 10 to base 7 using subtraction method:

Step 1:

Check the possibility of multiplying any integer with the powers of 7 which may result in lower number than 387. The number that can be subtracted from the given number 387 with the power of 7 is 343. The number 343 is less than 387. So subtract 343 from 387.

387-343=73x1------------44

Step 2:

Take 7 to power of 2 that is 49. The number 49 is greater than 44. So make the value as 0.

44-0=72x0------------44

Step 3:

The number that can be subtracted from the given number 44 with the power of 7 is 7 and it should be multiplied by 6 in order to get the nearest number of 44. The number 42 is less than 44. So subtract 42 from 44

Explanation of Solution

d)

Converting 633 base 10 to base 9 using subtraction method:

Step 1:

Check the possibility of multiplying any integer with the powers of 9 which may result in lower number than 633. The number that can be subtracted from the given number 633 with the power of 9 is 81 and it should be multiplied by 7 in order to get the nearest number of 633. The number 567 is less than 633. So subtract 567 from 633.

633-567=92x7------------66

Step 2:

The number that can be subtracted from the given number 66 with the power of 9 is 9 and it should be multiplied by 7 in order to get the nearest number of 66. The number 63 is less than 66. So subtract 63 from 66

Blurred answer
Students have asked these similar questions
3. Problem Description: Define the Circle2D class that contains: Two double data fields named x and y that specify the center of the circle with get methods. • A data field radius with a get method. • A no-arg constructor that creates a default circle with (0, 0) for (x, y) and 1 for radius. • A constructor that creates a circle with the specified x, y, and radius. • A method getArea() that returns the area of the circle. • A method getPerimeter() that returns the perimeter of the circle. • • • A method contains(double x, double y) that returns true if the specified point (x, y) is inside this circle. See Figure (a). A method contains(Circle2D circle) that returns true if the specified circle is inside this circle. See Figure (b). A method overlaps (Circle2D circle) that returns true if the specified circle overlaps with this circle. See the figure below. р O со (a) (b) (c)< Figure (a) A point is inside the circle. (b) A circle is inside another circle. (c) A circle overlaps another…
1. Explain in detail with examples each of the following fundamental security design principles: economy of mechanism, fail-safe default, complete mediation, open design, separation of privilege, least privilege, least common mechanism, psychological acceptability, isolation, encapsulation, modularity, layering, and least astonishment.
Security in general means the protection of an asset. In the context of computer and network security, explore and explain what assets must be protected within an online university. What the threats are to the security of these assets, and what countermeasures are available to mitigate and protect the organization from such threats. For each of the assets you identify, assign an impact level (low, moderate, or high) for the loss of confidentiality, availability, and integrity. Justify your answers.

Chapter 2 Solutions

Essentials of Computer Organization and Architecture

Ch. 2 - Prob. 11RETCCh. 2 - Prob. 12RETCCh. 2 - Prob. 13RETCCh. 2 - Prob. 14RETCCh. 2 - Prob. 15RETCCh. 2 - Prob. 16RETCCh. 2 - Prob. 17RETCCh. 2 - Prob. 18RETCCh. 2 - Prob. 19RETCCh. 2 - Prob. 20RETCCh. 2 - Prob. 21RETCCh. 2 - Prob. 22RETCCh. 2 - Prob. 23RETCCh. 2 - Prob. 24RETCCh. 2 - Prob. 25RETCCh. 2 - Prob. 26RETCCh. 2 - Prob. 27RETCCh. 2 - Prob. 28RETCCh. 2 - Prob. 29RETCCh. 2 - Prob. 30RETCCh. 2 - Prob. 31RETCCh. 2 - Prob. 32RETCCh. 2 - Prob. 33RETCCh. 2 - Prob. 34RETCCh. 2 - Prob. 1ECh. 2 - Prob. 2ECh. 2 - Prob. 3ECh. 2 - Prob. 4ECh. 2 - Prob. 5ECh. 2 - Prob. 6ECh. 2 - Prob. 7ECh. 2 - Prob. 8ECh. 2 - Prob. 9ECh. 2 - Prob. 10ECh. 2 - Prob. 11ECh. 2 - Prob. 12ECh. 2 - Prob. 13ECh. 2 - Prob. 14ECh. 2 - Prob. 15ECh. 2 - Prob. 16ECh. 2 - Prob. 17ECh. 2 - Prob. 18ECh. 2 - Prob. 19ECh. 2 - Prob. 20ECh. 2 - Prob. 21ECh. 2 - Prob. 22ECh. 2 - Prob. 23ECh. 2 - Prob. 24ECh. 2 - Prob. 25ECh. 2 - Prob. 26ECh. 2 - Prob. 27ECh. 2 - Prob. 29ECh. 2 - Prob. 30ECh. 2 - Prob. 31ECh. 2 - Prob. 32ECh. 2 - Prob. 33ECh. 2 - Prob. 34ECh. 2 - Prob. 35ECh. 2 - Prob. 36ECh. 2 - Prob. 37ECh. 2 - Prob. 38ECh. 2 - Prob. 39ECh. 2 - Prob. 40ECh. 2 - Prob. 41ECh. 2 - Prob. 42ECh. 2 - Prob. 43ECh. 2 - Prob. 44ECh. 2 - Prob. 45ECh. 2 - Prob. 46ECh. 2 - Prob. 47ECh. 2 - Prob. 48ECh. 2 - Prob. 49ECh. 2 - Prob. 50ECh. 2 - Prob. 51ECh. 2 - Prob. 52ECh. 2 - Prob. 53ECh. 2 - Prob. 54ECh. 2 - Prob. 55ECh. 2 - Prob. 56ECh. 2 - Prob. 57ECh. 2 - Prob. 58ECh. 2 - Prob. 59ECh. 2 - Prob. 60ECh. 2 - Prob. 61ECh. 2 - Prob. 62ECh. 2 - Prob. 63ECh. 2 - Prob. 64ECh. 2 - Prob. 65ECh. 2 - Prob. 66ECh. 2 - Prob. 67ECh. 2 - Prob. 68ECh. 2 - Prob. 69ECh. 2 - Prob. 70ECh. 2 - Prob. 71ECh. 2 - Prob. 72ECh. 2 - Prob. 73ECh. 2 - Prob. 74ECh. 2 - Prob. 75ECh. 2 - Prob. 76ECh. 2 - Prob. 77ECh. 2 - Prob. 78ECh. 2 - Prob. 79ECh. 2 - Prob. 80ECh. 2 - Prob. 81ECh. 2 - Prob. 82E
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education