Sponsored Content
Full Discussion: Code
The Lounge What is on Your Mind? Code Post 302860659 by stoudtLion on Monday 7th of October 2013 01:18:10 AM
Old 10-07-2013
Code

When you trying for work with computers first you see KB (or KiloBytes)and MB (or MegaBytes) all the time but where you does it stand for?Basically it’s a measurement of memory on a computer.
Here i have some examples of what some other numbers and letters look like to the computer:

Code:
0 = 00000000	a = 01100001	L = 01001100
1 = 00000001	v = 01110110	p = 01110000
2 = 00000010	$ = 00100100	z = 01111010

Link deleted.
Moderator's Comments:
Mod Comment The posts by this user almost seem to be real, but the opening statements are incorrect statements of fact. The poster does not respond to comments. This poster has been banned.

Last edited by Don Cragun; 10-21-2013 at 08:28 AM.. Reason: Spam.
 

6 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Return code from PL/SQL Code

Hi Guys, I was just wondering if anybody can help me with this problem. OK, how we can get a value back from PL/SQL Script (not stored procedure/function) See the below example: (for example aaa.sh) #!/bin/ksh VALUE=`sqlplus -s user/password@test_id <<EOF @xxx.sq EOF` echo $VALUE ... (7 Replies)
Discussion started by: Shaz
7 Replies

2. Programming

how i prepare a c++ code(c code) for implementing my own protocol format

helo my protocol format is given below { destno,mode,no.of packet,pktsize,,pktno,textsize,CRC} description:- { is starting flag destno - 4bytes mode - 1 byte no.of pkt - 4byes pktsize - 6 bytes ... (1 Reply)
Discussion started by: amitpansuria
1 Replies

3. Shell Programming and Scripting

translate ksh code to csh code

hi all, Can any 1 help me translate this korn shell code to C shell code : email=$(grep "^$1" $folder/config_2.txt | awk '{print $2'}) In config_2.txt the content is : which mean in korn shell , $1=groupname and $2=email address. Now i need to write in C shell script,when i set the... (2 Replies)
Discussion started by: proghack
2 Replies

4. UNIX for Dummies Questions & Answers

If ‘922’ Code does not exist on ‘03’ Record, ‘901’ Code will be there instead, move ‘03’ R

01,011600033,011600033,110516,0834,2,90,,2/ 02,011600033,011103093,1,110317,0834,,2/ 03,105581,,015,+00000416418,,,901,+00000000148,,,922,+000000 00354,,/ 03,113806,,015,+00000559618,,,901,+00000000096,,,922,+000000 00621,,/ 88,902,+0000000025218,,/... (1 Reply)
Discussion started by: sgoud
1 Replies

5. Shell Programming and Scripting

Block of code replacement in Java source code through Unix script

Hi, I want to remove the following code from Source files (or replace the code with empty.) from all the source files in given directory. finally { if (null != hibernateSession && hibernateSession.isOpen()) { //hibernateSession.close(); } } It would be great if the script has... (2 Replies)
Discussion started by: hareeshram
2 Replies

6. Linux

Go to a line of code , skip few lines of code

Hi , I have a code where i am using a infinite while loop . some thing like below while do if then #go to line 20 fi command 1; command 2; #line 20: sleep 34; (5 Replies)
Discussion started by: Paarth
5 Replies
xbill(6)							   Games Manual 							  xbill(6)

NAME
xbill - save your computers from Wingdows [TM] virus SYNOPSIS
xbill [-l level] [--gui gui] [--sizesize] [-v] [-h] DESCRIPTION
Ever get the feeling that nothing is going right? You're a sysadmin, and someone's trying to destroy your computers. The little people running around the screen are trying to infect your computers with Wingdows [TM], a virus cleverly designed to resemble a popular operating system. Your objective is to click the mouse on them, ending their potential threat. If one of the people reaches a computer, it will attempt to replace your operating system with the virus it carries. It will then attempt to run off the screen with your vital software. The game ends when only 1 (or 0) of your computers are being productive. Additionally, some computers are connected with network cables. When one computer on a network becomes infected, a spark will be sent down the cable, and will infect the computer on the other end when it reaches there. Clicking the button on one of the little people will cause it to cry out in pain and melt (id software eat your heart out!), dropping the stolen os if it is carrying one. If a computer is running Wingdows or is temporarily off, the os can be dragged back to the computer (or another computer compatible with that os). To extinguish a spark, drag the bucket of water from the upper left corner onto it. The status bar at the bottom tells the following: Number of Bills on/off the screen Number of Computers running their OS/off/Wingdows Level Score OPTIONS
-l n Start at level n. --gui gui Use a specific front end. The possible values are gtk, motif, and athena. Note that some of these may not be compiled into the binary. --size size Play on a field of size x size, instead of the normal 400x400. size must be larger than 400. -v Print version number and exit. -h Print help and exit. When using the GTK gui, all standard GTK options are supported. When using the Athena or Motif GUI, all standard X Intrinsics options are supported. AUTHORS
Main Programmer: Brian Wellington <bwelling@xbill.org> Programming & graphics (v2.0 and earlier): Matias Duarte <matias@hyperimage.com> COPYING
Copyright (c) 1994-2001 Psychosoft It's FREE! If you want to express your undying gratitude to us for bringing a small bit of meaning into your otherwise pointless existence, you could always send us e-mail. XBill is distributed under the GNU General Public License. Go play the game now! Version 2.1 October 2001 xbill(6)
All times are GMT -4. The time now is 11:13 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy