Sunday, September 20, 2020

Binary Conversions



The conversion of numbers is common in mathematics and has been used for many generations.  During the creation of computers number conversion became even more common and necessary.  Although once the internet came about and allowed sharing data the ability to convert these numbers became a bit easier for the end user.  There are many ways of which you can convert numbers between number bases, and it is fairly simple in doing so. 
Although it may be simple it can seem just a bit confusing at first.  Remember as an adult you have been using base 10 since you were a child, even though it may not seem like it.  For example, base 10 is simply numeric values from 0 to 9, but since we do not have a single digit to express 10 like the romans "X" then we add 1 to the tenth place and zero out the ones place.  As another example, when you are adding 1 to 19, the 1 is technically added to the tenths place and the ones column is zeroed out.
Now that we have the basic concept of base 10 understood, let's take a look at base-two which is also known as binary.  Just as we use base 10 regularly throughout our lives as mentioned above, base 2 "binary" is very similar.  Instead of the highest digit being a 9 and when a 1 is added it rounds to 10, with binary the highest digit is 0 so when a 1 is added it rounds to one.  This is caused by there being no single digit for two in binary. 
With the two first bases described and understood we can now discuss conversion from base 10 to base 2 (binary) and back again.  Our first base 10 number being five, base ten converted to binary.  Start off with dividing the desired base such as two into the number we want to convert.  This division will require we use remainders like we did when we were all in elementary school.  If we take the 2 from base 2 and divide it into 5 that gives us 2 R 1, then we divide the 2 by 2 again, which gives us 1 R 0, then we divide the 1 by 2 which gives us 0 R 1.  Leaving us with the following remainders 1,0,1.  Thus being the binary conversion of 5 base 10 equals 101 base 2.
Converting base 10 back to binary almost seems a bit simpler, but it takes a keen eye to understand it.  I will use our previous numbers to make it a bit easier to understand.  Our binary number is 101 base 2 which can be listed as, (1x 22) + (0x21) + (1x20) = (1x4) + (0x2) + (1x1) = 4 + 0 + 1 = 5.  Now after reviewing this how did I manage to turn 101 to the equation above?  The digits 101 times two to the place power and add.
When converting a binary number to a decimal has similar rules that apply.  I will use the previous binary number of 101 that we used above.  Now for each number we have a list of power of two, for example 22 , 21, 20 which is 4,2,1.  Take these numbers and plug them in (4x1)+(2x0)+(1x1) = (4)+(0)+(1) = 5.  This method is simply going backwards from base 10 to binary and binary back to base 10.
Considering binary is base 2 and hexadecimal is base 16 and they are both powers of 2 this is a simpler conversion than binary to decimal.  Since hexadecimal numbers can either be numbers of 0-9 or even characters A-F, you can convert binary strings to hexadecimals.  First off you need at least a four digit binary number.  We will start with 1010 and add a "small number" to the top right of each digit a different power of 2, signifying their place as so, 180412 01.  This tells you how many of each number you have, which turns to 8020.  Now you can add the four numbers together as so, 8+0+2+0= 10.  All in all the binary number 1010 would convert to 10 which is an A in the hexadecimal system.
It is extremely important to be able to convert numbers and truly understand the numeric conversion methods.  All information and data is sent and stored in binary.  If an IT professional is unable to convert numbers as mentioned, then it would be more difficult to troubleshoot and decode many necessary parts of the IT world.  Also, if becoming a system programmer the ability to easily convert these numbers and translate them in their heads would allow them to easily understand the system.  This is definitely important if you would like to be able to code in assembly or machine code.
 
References
Binary to Decimal Conversion. (n.d.). Retrieved February 5, 2017, from Electronics Tutorials: http://www.electronics-tutorials.ws/binary/bin_2.html
Bogomolny, A. (n.d.). Implementation of Base Conversion. Retrieved February 5, 2017, from Cut the Knot: http://www.cut-the-knot.org/recurrence/conversion.shtml
Englander, I. (2014). The Architecture of Computer Hardware, Systems Software, & Networking An information technology approach. Don FowleY.

Essay Form Review


As there are many different types of essay forms such as expository, persuasive, compare/contrast, critical/evaluative, descriptive, or even cause/effect (Kaplan University Writing Center, 2010).  Therefore, researching these essay forms within, “The Kaplan Guide to Successful Writing”, before reading the required article seemed to be the best course of action.  The many different types of essay forms available allow writers the ability to express researched information or opinions in various methods.  After reading and reviewing the required article, “Organizations' information security policy compliance: Stick or carrot approach?” by (Yan Chen, Winter 2012 - 13), I found it to be quite a heavy read.  Although, the article did contain very informative information that I may use in the future to come.  Throughout reading the article there were many keys towards the essay form expository and I plan to explain further.
An expository essay form utilizes facts instead of opinions and its overall purpose is to inform the audience about the subject matter.  Also, it is not utilized for argumentative usage of any kind and it is a great way to learn about different perspectives.  This type of essay is used by many students as it is great to explore a large variety of topics.  Audiences for an expository essay is a very general one as it can depend on the chosen topic.  As with most essays it is always best to assume the audience does not have any prior knowledge within the topic (Kaplan University Writing Center, 2010).
As we all fully understand the basics of an expository essay form, relating the essay and form together can be quite easy if its laid out for you.  For example, an expository form utilizes research during the beginning of the essay and will apply any type of facts throughout without persuasion.  Just as the beginning paragraphs within the article of, “Organizations' information security policy compliance: Stick or carrot approach?” (Yan Chen, Winter 2012 - 13), provides an introduction of the authors, an abstract, then facts from research found within another article about an information security concern. Therefore, they move forward with discussing information security policy compliance and its organization.  The author Yan Chen, utilizes a list of facts and explains the research found for each piece of information within the information security policy compliance option.
The fact of the matter is that the entire essay of thirty-three pages contains a numerous amount of information in many different depictions.  All the way from words/sentences, pictures/figures, tables/spreadsheets, and even graphs/modes.  To further explain the examples of an expository essay form these would show the following.  Figures and research models are provided throughout the essay along with hypothesis.  As the research progresses for the information security compliance essay there are test results available for others to view.  Along with many other tables that compare results between the punishments, rewards, and enforcement.  Overall, with the amount of research data shown it provides enough evidence to be an expository.
In conclusion, I honestly had a slight feeling that it could be two essay forms but I stuck with one essay form to play it on the safe side.  The entire article itself is full of research and information, Organizations' information security policy compliance: Stick or carrot approach?, and not once does it have any persuasion, cause/effect, critical/evaultive, but could be considered a bit descriptive considered the length.  Overall, the article is a great read and will be very beneficial to my future.  With the recent problems and issues lately, I may change my Master’s major and look into Information Security.



References
Jennifer Propp, J. T. (2010). Essay Forms. In The Kaplan Guide to Successful Writing (pp. 349-388). New York: Kaplan Publishing, a division of Kaplan, inc.
Yan Chen, K. (.-W. (Winter 2012 - 13). Organizations' information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157 - 188. doi:10.2753/MIS0742-1222290305

Binary Conversions

The conversion of numbers is common in mathematics and has been used for many generations.   During the creation of computers number co...