


Computer numerical calculations are all binary, but will different encodings generate different binary numbers?
For example, when calculating 2*3, the computer will first convert it into binary for calculation. If it is a different encoding form, does it correspond to a different binary?
Reply content:For example, when calculating 2*3, the computer will first convert it into binary for calculation. If it is a different encoding form, does it correspond to a different binary?
Yes, different encodings will have different methods of recording data, and of course they will also be similar.
Encoding mainly targets strings. Digital storage is also divided into big and small endian order, which are all manifestations of different binary data recording rules.
First of all, what you are talking about should be "2*3" in the source code. The character encoding of the source code files can be different, and their binary representations are also different. Then you mentioned "calculation", which must first be compiled to generate target code before it can be executed (whether it is interpreted or executed by cpu instructions). If you generate machine code, then on the same machine, the format of digital storage it's the same. If it is the bytecode generated by a virtual machine, the number format is the same as the encoding of the bytecode.
You must first figure out the type of data. Your calculation of 2*3 is a calculation of two integers, which is 10*11 (binary). There is no encoding. If you put it on different architectures, it just means that the length of the integers is different.
The encoding you mentioned is for characters. For example, the ASCII of 2 and 3 are 0110010 and 0110011 respectively. This is not used for calculation.
Yes, you can use any encoding and store it however you want.
But the calculation results must be the same.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

In PHP8, match expressions are a new control structure that returns different results based on the value of the expression. 1) It is similar to a switch statement, but returns a value instead of an execution statement block. 2) The match expression is strictly compared (===), which improves security. 3) It avoids possible break omissions in switch statements and enhances the simplicity and readability of the code.

Backend learning path: The exploration journey from front-end to back-end As a back-end beginner who transforms from front-end development, you already have the foundation of nodejs,...

In PHP, you can effectively prevent CSRF attacks by using unpredictable tokens. Specific methods include: 1. Generate and embed CSRF tokens in the form; 2. Verify the validity of the token when processing the request.

Strict types in PHP are enabled by adding declare(strict_types=1); at the top of the file. 1) It forces type checking of function parameters and return values to prevent implicit type conversion. 2) Using strict types can improve the reliability and predictability of the code, reduce bugs, and improve maintainability and readability.

Which libraries in Go are developed by large companies or well-known open source projects? When programming in Go, developers often encounter some common needs, ...
