Tuesday, January 28, 2020

How Number System Is Used In IT

How Number System Is Used In IT In this documentation I have discussed of how the application of number system is used in IT applications in both hardware and applications, operating system and in programming language. I have discussed about the use of base 2 in the 8 bit bytes form use with the operation for subnet. The use of hexadecimal form addressing memory and classless inter Domain Routing. There are number of different numbering system which is in use for the unique ability to represent different numbers. Binary, Octal, Denary and Hexadecimal are number systems that are used in different aspects Denary number is the most commonly used number system which is frequently used in daily life. Nevertheless each number system has associated benefits which are the reason that different number systems are used in different areas. Each of the number system has a fix number of representation of numbers which are used to represent the numbers like, say for example Binary numbers are represented by either one or zero, Octal numbers are represented by numbers from 0, 1, 2, 3, 4, 5, 6, 7 whereas Denary and Hexadecimal numbers are represented by the number of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and 0, 1,2. 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, respectively. Binary Numbers Binary numbers are mostly used when there are only two options available so if one is false then the other is true. Examples of binary system can be their usage to represent bits in a computer which can have only 0 or 1 value a switch in a electric circuit which can be either on (1) or off (0). Binary system is widely used to represent situations in everyday normal life as well for example for electronic gates in electricity circuits, false or true statements can also be displaced in terms of binary digits where 0 represents false and 1 represents true states. Denary Numbers Denary numbers are frequently used in everyday life in accounting, calendar systems, financial systems or daily routine counting. The main benefits of Denary number system is that they are easier to use as compared to other number systems and have more number to present different situations though Hexadecimal number system has more representations but that representation can include characters in them as well which makes them more difficult to understand and use as compare to denary system. Denary number systems are so frequently used that a person even do not need to have a formal education to know or use them. One of the reasons can be that it is frequently use in daily life accounting. Other number systems are used in more specified fields such as computing and hence would need to be learned. Octal Numbers Octal numbers are not that commonly used as compared to other numbers and are mostly used in computing graphics, text and famous operating system such as UNIX also uses octal numbers for their file protection system. Octal numbers have total of 8 unique representations which can be combined together to make more octal number representations. Octal numbers are difficult to understand for a normal person who has limited number of understanding about the number system. As after 7 different numbers are used to represent numbers from 7 onwards and hence they seem physically bit difficult to comprehend. The number system needs to use a subscript of 8 with is number to represented they are not Denary but octal number otherwise confusion can easily occurred. Hexadecimal Number System Hexadecimal number are used where there are more options which needs to be represented off and are mostly commonly used in computing to represent different memory locations. Since binary, octal and hexadecimal have representations which are powers of 2 (power of 0 in binary, 3 in octal and 4 in hexadecimal) hence that makes them more suitable to different situations, which require different number representations. They are positively contributing to the daily life and to the technology and logical world as well and needs to be understood properly if one needs to take advantage of such technology. Whilst the above gives uses of the binary, octal and hex number systems in different areas of IT and while some example are given the manager encourages you to research a wide range of examples for him to look at. Binary Number System used in ASCII table and IP Address Binary number system are also used in the ASCII table to represent different codes for different characters which then can be used into computing as well. ASCII number is more like a combination of binary numbers. Binary numbers are also used in IP addressing system again which is a combination of Binary number and are used in computing field. These IP addresses are of two different versions now one is known as IP 4 and other one is known as IP 6. These IP addresses are further sub divided into different classes such as class A, B and C where each class has a different number of hosts and network address. The ASCII character set, each binary value between 0 and 127 is given a specific character. Most computers extend the ASCII characters set to use the full range of 256 characters available in a byte. The upper 128 characters handle special things like accented characters from common foreign languages. In ASCII character set, each character is represented by 7 bits when stored in the computer and in an extended ASCII character set, each character is represented by 8 bits. Say for example: ASCII 0000000 represents NULL Similar the word HELLO if converted into binary using the ASCII to binary conversation could be represented as follows. 01001000 01000101 01001100 01001100 01001111(in decimal 72 69 76 79) Please refer an ASCII character table for further understanding of this conversion. ASCII Binary Conversation Octal numbering system for file protection in UNIX Every file or folder in UNIX has access permission. There are three types of permissions (what allowed to do with a file): Read Access Write Access Execute Access Permissions are defined for three types of users: The owner of the file The group that the owner belongs to Other users Thus, UNIX file permission are nine bits of information (3 types x 3 type of users), each of them may have just one of two values: allowed or denied. Simply put, for each file it can be specified who can read or write from/to the file. For programs or scripts it also can be set if they are allowed to be executed. Textual representation like -rwxr-r- It is used in UNIX long directory listings. It consists of 10 characters. The first character shows the file type. Next 9 characters are permissions, consisting of three groups: owner, groups, others. Each group consists of three symbols: rwx (in this order), if some permission is denied, then a dash -is used instead. For example -rrwxrr- 0123456789 Symbol in the position 0 (-) is the type of the file. It is either d if the item is a directory or l if it is a link, or - if the item is a regular file. Symbols in positions 1 to 3 (rwx) are permissions for the owner of the file. Symbols in positions 4 to 6 (r) are permissions for the group. Symbols in positions 7 to 9 (r) are permissions for others. r Read access is allowed w Write access is allowed x Execute access is allowed Replaces r, w or x if according access type is denied Numeric (octal) representation like 664 If a numeric representation is used (like in chmod-command, for example), then it is in the octal format (with the base of 8), and digits involved are 0 to 7. Octal format is used for the simplicity of understanding: every octal digit combines read, write and execute permissions together. Respective access rights for owner group and others (in this order) are the last three digits of the numeric file permissions representation. Example: 0644. Here the second digit (6 in the example) stands for rights of the owner, the third digit (4 in the example) stands for rights of the group, the fourth digit (4 in the example) stands for rights of others. The below tales show what numeric values mean: Octal digit Text equivalent Binary value Meaning 0 000 All types of access are denied 1 x 001 Execute access is allowed only 2 -w- 010 Write access is allowed only 3 -wx 011 Write and execute access are allowed 4 r 100 Read access is allowed only 5 r-x 101 Read and execute access are allowed 6 rw- 110 Read and write access are allowed 7 rwx 111 Everything is allowed According to the above table we can see that 1 stands for execute only, 2 stands for write only, 4stands for read only. To combine the permission you can simply add 1, 2 and 4 to get a needed combination. For instance, to get read and write permission, you add 4 (read) and 2 (write), thus getting 6 (read and write). To get read and execute permissions, you add 4 (read) and 1 (execute), this getting 5 (read and execute). Example: 755 on a file would mean rwx r-x r-w permission on the file. Simply convert the octal number to the binary equivalent and enable the permission where the bits are 1. 755 would mean 111 101 101 In addition there is one more octet representing the Set user ID, set group ID, sticky bit which works in a similar way. Octal digit Binary value Meaning 0 000 setuid, setgid, sticky bits are cleared 1 001 sticky bit is set 2 010 setgid bit is set 3 011 setgid and sticky bits are set 4 100 setuid bit is set 5 101 setuid and sticky bits are set 6 110 setuid and setgid bits are set 7 111 setuid, setgid, sticky bits are set Explain the use of binary in IP addressing for both V4 and V6? Use of binary in IP addressing for V4: Each IP in a V4 IP addressing consists of 32 bits. These 32 bits are divided into 4 octets of 8 bits each. An IP address is represented like this: 172.12.12.46. A computer can understand only binary values and therefore each IP is stored in binary. Each octet is represented as follows. For example if the value of the first octet is 128, it would be represented as follows: 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 0 Therefore an IP 128.128.128.128 would be stored as follows: 10000000 10000000 10000000 10000000 Use of binary in IP addressing for V6: While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128(3.4 x 1038) addresses. This expansion allows for many more devices and user on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. The IPv6 128-bit address is divided along 16-bit boundaries. Each 16-but block is then converted to a 4-digit hexadecimal number, separated by colons. The resulting representation is called colon-hexadecimal. This is in contrast to the 32-bit IPv4 address represented in dotted-decimal format, divided along 8-bit boundaries, and then converted to its decimal equivalent, separated by periods. The following example shows a 128-bit IPv6 address in binary form: 0010000111011010000000001101001100000000000000000010111100111011 0000001010101010000000001111111111111110001010001001110001011010 The following example shows this same address divided along 16-bit boundaries: 0010000111011010 0000000011010011 0000000000000000 00101111001110110000001010101010 0000000011111111 1111111000101000 1001110001011010 The following example shows each 16-bit block in the address converted to hexadecimal and delimited with colons. 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A IPv6 representation can be further simplified by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. The following example shows the address without the leading zeros: Javascript:CodeSnippet_CopyCode(CodeSnippetContainerCode3); 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Binary in describing class A, B and C IP addresses The class of the address determines which part belongs to the network address and which part belongs to the node address. All nodes on a given network share the same network prefix but must have a unique host number. Class A Network binary address start with 0, therefore the decimal number can be anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226, where 102 identifies the network and 168.212.226 identifies the host on that network. Class B Network binary addresses start with 10, therefore the decimal number can be anywhere from 128 to 191. (The number 127 is reserved for loopback and is used for internal testing on the local machine.) The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168.212.226.204 where 168.212 identifies the network and 226.204 identifies the host on that network. Class C Network binary addresses start with 110, therefore the decimal number can be anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 200.168.212.226 where 200.168.212 identifies the network and 226 identifies the host on that network. Hexadecimal for addressing memory Memory addresses are displayed as two hex numbers. An example is C800:5. The part to the left of the colon (C800) is called the segment address, and the part to the right of the colon (5) is called the offset. The offset value can have as many as four hex digits. The actual memory address is calculated by adding a zero to the right of the segment address and adding the offset value, like this: C800:5 = C8000 + 5 = C8005 C8005 is called as the absolute or linear address of the memory. Similarly F000:FFFD can be computed to get the following memory address. F0000 + FFFD FFFFD or 1,048,573(decimal) The Segment: Offset addressing was introduced at a time when the largest register in a CPU was only 16-bits long which meant it could address only 65,536 bytes (64 KB) of memory, directly. But everyone was hungry for a way to run much larger programs! Rather than create a CPU with larger register sizes (as some CPU manufacturers had done), the designers at Intel decided to keep the 16-bit registers for their new 8086 CPU and added a different way to access more memory: They expanded the instruction set, so programs could tell the CPU to group two 16-bit registers together whenever they needed to refer to an Absolute memory location beyond 64 KB. Classless Inter Domain Routing Classless Inter Domain Routing. CIDR was invented several years ago to keep the internet from running out of IP addresses. The classful system of allocating IP addresses is very wasteful. Anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organisations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet. CIDR specifies an IP address range using a combination of an IP address and its associated network mask. CIDR notation uses the following format xxx.xxx.xxx.xxx/n where n is the number of (leftmost) 1 bits in the mask. For example, 192.168.12.0/23 applies the network mask 255.255.254.0 to the 192.168 network, starting at 192.168.12.0. This notation represents the address range 192.168.12.0 192.168.13.255. Compared to traditional class-based networking, 192.168.12.0/23 represents an aggregation of the two Class C subnets 192.168.12.0 and 192.168.13.0 each having a subnet mask of 255.255.255.0. In other words, 192.168.12.0/23 = 192.168.12.0/24 + 192.168.13.0/24

Sunday, January 19, 2020

Symbolism in “The Story of an Hour” Essay -- Literary Analysis, Kate C

The symbols and imagery used by Kate Chopin's in â€Å"The Story of an Hour† give the reader a sense of Mrs. Mallard’s new life appearing before her through her view of an â€Å"open window† (para. 4). Louise Mallard experiences what most individuals long for throughout their lives; freedom and happiness. By spending an hour in a â€Å"comfortable, roomy armchair† (para.4) in front of an open window, she undergoes a transformation that makes her understand the importance of her freedom. The author's use of Spring time imagery also creates a sense of renewal that captures the author's idea that Mrs. Mallard was set free after the news of her husband's death. Right from the moment Louise Mallard hears of her husband's death, Kate Chopin dives into a her vivid use of imagery. â€Å"When the storm of grief has spent itself† introduces a weather oriented theme (para.3). This imagery depicts a violent and dark setting that denotes death and grief. Her reaction to her husband's death ideally what society would expect. Her acute reaction instantly shows that she is an emotional, demonstrative woman. Even tho...

Saturday, January 11, 2020

Monologue of a Serial Killer

How was I supposed to know that this was wrong, when it felt so right? Everything my father has taught me is wrong†¦ He taught me not to love, taught me not to feel, have no compassion for others. How†¦how could this be wrong, my whole life a lie; that’s what it was, that’s what I could reduce it to, a lie. Where had my mother been when my father had been teaching me these things? Where had aunts, uncles, grandpas, grandmas, cousins†¦ teachers, anybody been to tell me, to show me that†¦that all of this was wrong. Wrong†¦that word doesn’t seem real now, and it will never truly seem real, because I’ve never known anything else. I sound like I’m trying to shoulder the blame but I’m not, I’m truly not; I just†¦I felt so accepted by him, and loved, so loved that I didn’t really need anyone else†¦you know, the kind of love where†¦where anything could happen, and that one person would still be there; still there listening to everything you ever have to say, any problems and they say one word, two words, a sentence and everything is better†¦everything is fixed. My father is the kind of person I always wished I was; strong, capable, a true man†¦a real man†¦someone I would never be. My father says my mother held me too much when I was a child; he had to get me away from her quickly, so†¦so he found something to bond us together, found something that my mother could never be a part of, would never be a part of. And my mother, my mother didn’t seem to notice how I changed. I changed so drastically in the space of about 5 months; my perspective on life changed, suddenly I started to view everyone as a victim, as an outsider, and eventually the only person I could trust was my father, the only person I believed was him; my father, my best friend, my partner, my mentor, the one person who I could go to, who I knew could never judge because his crimes are worse than mine, much worse. I’m told that I’m a victim in all of this; a victim of my environment, a product created by my father for his own means. How can I believe that? How†¦how can that be true after everything he said, everything we’ve done together, always together. I told him we shouldn’t have taken her, that last one; she was wanted, she had friends, she had a family, she had a future, she†¦she was somebody†¦loved. But he had to have her and I couldn’t tell him no, he was the master he’d say, and I was his student†¦a student still after 12 years, 12 long years stretching out behind me. When I look at those years now I see there was no love there, how could he ever love anything more than what he did to those girls? He was alive when I watched him do that; his eyes, they sparkled and twinkled in the night. I try to remember a time when I’ve seen him happy like that with my mother and I can’t†¦I can’t. I’ve seen him smile, obviously I’ve seen him smile, but happiness is something a child should witness from a parent in normal circumstances†¦but then again what’s normal? They say normal is gardening, cooking, cleaning, washing, golfing†¦perhaps driving, stalking, watching, learning, catching, cutting, killing, digging†¦burying†¦none of that is normal, so I’ve been told. My mind†¦my mind is mixed up and all I can hear is my mother crying†¦crying trying to convince herself that she didn’t know what was going on. I want to see my father, but I’m not allowed. As if anything he could say would influence me more than he has done already; there’s nothing they can say now to make me confess, to speak a bad word about my father. I am his†¦forever his†¦but he will never be mine.

Friday, January 3, 2020

Civil War Weaponry - 1085 Words

Ketchum Grenades In August of 1861, William F. Ketchum patented the Ketchum Hand Grenade. Shortly after, in the years of 1863 and 1864, the grenade was implemented in the American Civil War. With a lemon-shaped piece of iron and a tail made of paper or cardboard, the handheld explosive greatly resembled a dart. On the front of the grenade’s body was a plunger, which held a percussion cap filled with explosive material.When the the grenade fell onto its nose and applied pressure to the plunger, an explosion was triggered, only to be met by more gunpowder inside. Although the resulting explosion caused a great deal of mayhem and shrapnel, it was not very reliable because its detonation depended on the grenade falling directly onto its nose. Because of its temperamental behavior, the grenade got a reputation for not being very accurate. During its use by the Union army, the weapon was still in its earliest stages. Although the Confederate army did not adopt this specific weapon, they had similar ideas such as the Raines grenade, which was similar in appearance, but completely inadequate for battle. Instead of cardboard fins for a stable flight, the Raines grenade had a cloth streamer. Ketchums were used in several important battles such as the battle of Vicksburg and the siege of Petersburg. Union soldiers threw the grenades at the Confederate troops and stood back for the explosion. They were faced with an unpleasant surprise when the Confederates found a way to avoid anyShow MoreRelatedCivil War Weaponry1420 Words   |  6 PagesWhat military technology introduced aided the Union in winning the Civil War? The American Civil War was a war over the secession of the Confederacy. The Confederate States of America were formed after 11 slave states declared their secession due to the election of an Anti-Slavery republican as president. The remaining 25 states formed the Union. Weapons such as the Gatling Gun, repeating rifle, which gave soldier the ability to fire multiple rounds without reloading, railroads and telegraphsRead MoreConflict Between Rational And Conflict1417 Words   |  6 PagesIntroduction The occurrence and recurrence of wars are made by rational actors, but what are the prerequisites for a war? There are numerous answers to this question with a wide range of answers that give a perspective on the various sources of conflict. The first is that the cost of war cannot be outrageously high. The anticipated outcome of gaining resources, power, and/or territory cannot exceed the expected cost of conflict, including damages to property and life. The second is that a failureRead MoreEffects Of The Arms Trade On National Growth1932 Words   |  8 Pagesacross Africa, is armed conflict. The longevity and sustainability of these conflicts is based solely on the prominence of the arms trade on the continent. This explicit trade feeds the conflicts and provokes a more militaristic approach to handling civil affairs. Therefore, the arms trade plays a decisive role in the violent circumstances in many countries. The flood of weapons leads directly to mass human rights violations that drive people from their homes, limit access to essential needs in overcrowdedRead MorePaper Exam 2 History Ib9416 Words   |  38 PagesHistorical processes such as comparison and contrast, placing events in context and evaluating different interpretations are used appropriately and effectively. Topic 1 1. –4– Causes, practices and effects of wars N11/3/HISTX/BP2/ENG/TZ0/XX/M With reference to one war before 1945 and one war after 1945, assess the significance of either air power or naval power in deciding its outcome. Air power can be taken to mean the use of aircraft in a variety of roles – as fighters/strafers, bombers, reconnaissanceRead MorePlay for a Kingdom by Thomas Dyja1220 Words   |  5 PagesPlay for a Kingdom written by Thomas Dyja is a novel about men’s honor and true self-worth during a time of the American Civil War. This war cultivates a persons will to live and willingness to rely on the soldiers who fight next to him. This novel demonstrates that men fighting with each other may have a difference of religion or place of origin; including their heritage, social structure, speech patterns, and native language, however each man is fighting for the same thing. The northern troopsRead MoreInfluences of Civil War Technology 1432 Words   |  6 PagesWar is something that everyone knows about. it is very prominent and chances a re throughout the history of the world there is always someone effected by it during any point in time. Wars come and go leaving many good and bad things behind, whichever light it is looked at from, weaponry is always one of those things. War time is notorious for pushing technology to the edge, this including weaponry. There have been several wars that impacted future weaponry but the Civil War is on the farthest awayRead MoreThe Industrial Revolution Of The Middle East1071 Words   |  5 PagesFor millennia mankind has exhausted endless amounts of energy contemplating the eternally complicated system of war. From Gangas Khan to America’s involvement in the Middle East, all successful generals, military leaders, and conquerors have found commonality in their zealous emphasis on, and desire for, possessing the most technologically advanced forms of weaponry. Such a desire was not ignored in America nor England during the Industrial Revolution, but, rather, was seen by many as an opportuneRead MoreEssay on Artillery and Weapons of the Civil War1510 Words   |  7 PagesEvery war, though happens for a reason and bring a better change, is often gruesome. The Civil War broke America in two groups and, at the time, was the war with the most casualties and injured men. As the fight to preserve the Union progressed, so did a number of other areas, such as weaponry and artillery. The advanced technology produced through the Civil War assisted in increasing number of casualties. The North was more fortuitous than the South in multitudinous ways. One of which includes theRead MoreThe Battle Of Gettysburg And Civil War1375 Words   |  6 PagesAmerican Civil War. Union forces of the North, commanded by Major General George G. Meade met and fought the Confederate forces of the South, commanded by General Robert E. Lee. Many historians believe the battle was a large turning point in the Civil War in favor of the Union (Woodworth, 2008). However, this is dispu table. The battle was also significant because it was the bloodiest battle of the war, which resulted in the death of 51,112 Soldiers (The Battle of Gettysburg, The American Civil WarRead MoreThe Civil War And The First Modern War1632 Words   |  7 PagesThe Civil War clash is often remembered for the carnage caused when army tactics failed to load rifles and muskets, and the tantalizing scene of lost and submerged warships. The revolutionary introduction of ships and railroad networks were just developing at the same time. Day after day, more cadavers lay under the scorching sun than any other life time. People fought everything they had, until nothing but the remains were left. From that era onwards, technology evolved, which provided us with