HTML & CSS
390 subscribers
728 photos
1 video
4 files
54 links
πŸ‘Œ HTML & CSS
@html_css_tut

πŸ‘ŒJavaScript
@javascript_tut

πŸ‘Œ PHP
@php_tut


πŸ‘ŒAll About Coding
@codingWithElias
Download Telegram
Computer Arithmetic

Now that binary numbers are discussed, it’s time to look at how their arithmetic works. But
there are two basic binary number representations so far. Unsigned binary numbers and binary
numbers that are represented using the sign and magnitude method.

@Computer_science_course
Addition & subtraction for signed binary integers (using sign and magnitude)

πŸ’ŽIf the binary numbers are signed then addition and subtraction can be expressed using just the
addition operation.

πŸ’ŽTake a look at the following equations.
πŸ“ŒX – Y = X + (- Y )
πŸ“Œ-X – Y = (- X ) + (- Y)

πŸ“ŽRecap: The first bit of the binary number indicates sign, 0 for positive and 1 for negative

πŸ”‘Rules:
1. Identify the sign of each binary number [ the sign bit is excluded for the calculation]

A. If they both have the same sign
πŸ“ŒAdd the two binaries.
πŸ“ŒApply the sign to the result.

@Computer_science_course
3) Multiplication for unsigned integers is straight
forward,

πŸ“ŒFind out the number of bits needed n

πŸ“Œ Represent both numbers with n

πŸ“Œ apply decimal multiplication rule

πŸ“Œ apply the unsigned binary addition rule

πŸ“Œcut-off unnecessary bits

@Computer_science_course
Division Rules:
πŸ“ŒAssumption
o n= number of bits of the divisor db1
o db2= dividend

πŸ“Œcut n from db2 to create a smaller binary b

πŸ“Œ if b is less than db1 then multiply db1 by 1

πŸ“Œif b is greater than db1 then multiply db1 by 0

πŸ“Œsubtract and continue until the dividend is exhausted
πŸ’Žapply the subtraction rule for unsigned integers

πŸ’Žtrim unnecessary bits

@Computer_science_course
Binary Complements
Complements are used to represent negative integers in a binary form.

πŸ’ŽPositive integers are
represented in the normal binary from.


βœ… 1’s complement
Simply convert 0s to 1s and 1s to 0s.

@Computer_science_course
Subtraction using 1’s complement.

πŸ’ŽSince every negative integer can be represented uniquely subtraction can be replaced with addition. Like previously
X – Y = X + (-Y).

πŸ”‘Rule: If there is a remainder at the end it’s added to the result.

@Computer_science_course
2’s compliment

πŸ’ŽThis is a more refined version of 1’s compliment.

πŸ’ŽIt solves the problem of 1’s complement.

πŸ’ŽTo find the 2’s complement of a negative integer, first find the 1’s complement the add 1.

@Computer_science_course
Multiplication 1's and 2's Complement

@Computer_science_course
Division 2's Complement

@Computer_science_course
Steps in SDLC

πŸ“ŒSDLC can be made up of multiple steps.
There is no concrete set number of steps involved.

πŸ“ŒAround seven or eight steps appear commonly;
however, there can be anywhere from five upwards to 12.
Typically, the more steps defined in an SDLC model,
the more granular the stages are.

πŸ’ŽIn general, an SDLC methodology follows these following steps:

@Computer_science_course
Steps in SDLC

πŸ“ŒSDLC can be made up of multiple steps.
There is no concrete set number of steps involved.

πŸ“ŒAround seven or eight steps appear commonly;
however, there can be anywhere from five upwards to 12.
Typically, the more steps defined in an SDLC model,
the more granular the stages are.

πŸ’ŽIn general, an SDLC methodology follows these following steps:

@Computer_science_course
1.Plan and requirements:

πŸ’ŽThe new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. Other factors defined include needed features, functions and capabilities.

@Computer_science_course
2. Analysis:

πŸ’ŽThe existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel.

@Computer_science_course
3. Design:

πŸ’ŽThe proposed system is designed. Plans are laid out concerning the physical construction, hardware, operating systems, programming, communications and security issues.


@Computer_science_course
4. Implementation

The project takes shape during the implementation phase. This phase involves the construction of the actual project result. Programmers are occupied with encoding, designers are involved in developing graphic material, contractors are building, the actual reorganisation takes place. It is during this phase that the project becomes visible to outsiders, to whom it may appear that the project has just begun. The implementation phase is the doing phase, and it is important to maintain the momentum.

@Computer_science_course
πŸ’ŽTesting: All aspects of performance must be tested. If necessary, adjustments must be made at this stage. Tests performed by quality assurance (QA) teams may include systems integration and system testing.

πŸ’ŽDeployment: The system is incorporated in a production environment. This can be done in various ways. The new system can be phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once.

πŸ’ŽUpkeep and maintenance: This step involves changing and updating the system once it is in place. Hardware or software may need to be upgraded, replaced or changed in some way to better fit the needs of the end-users continuously. Users of the system should be kept up-to-date concerning the latest modifications and procedures.

@Computer_science_course