Explain why is normalization essential in floating-point

Assignment Help Computer Engineering
Reference no: EM13468338 , Length: 1500 Words

Use APA format to answer the following questions:

Q1. Name five types of data that a computer can process.

Q2. How is bit pattern length related to the number of symbols the bit pattern can represent?

Q3. How does the bitmap graphic method represent an image as a bit pattern?

Q4. What is the advantage of the vector graphic method over the bitmap graphic method? What is the disadvantage?

Q5. What steps are needed to convert audio data to bits patterns?

Q6. Compare and contrast the representation of positive integers in unsigned, sign-and-magnitude format, and two's complement format.

Q7. Compare and contrast the representation of negative integers in sign-and-magnitude format, and two's complement format.

Q8. Compare and contrast the representation of zero in sign-and-magnitude, two's complement, and Excess formats.

Q9. Discuss the role of the leftmost bit in sign-and-magnitude and two's complement formats.

Q10. Why is normalization necessary in floating-point representations of real numbers; after a number is normalize, what kind of information does a computer store in memory. What is mantissa?

Reference no: EM13468338

Questions Cloud

Consider the vulnerabilities that were exploited before the : review the various definitions offered for domestic and international terrorism and for events that fall within both
T help show understanding of governments role in : to help illustrate your understanding of governments role in influencing trade this activity asks you to reflect on
Utilize the gcu library to locate at least three : write an essay that analyzes how this question is answered in the modern american criminal justice system. your
Write up to 3 paragraphs which reply to given questions : write up to 3 paragraphs which reply to the following questions with your thoughts ideas and comments. this will be the
Explain why is normalization essential in floating-point : use apa format to answer the following questionsq1. name five types of data that a computer can process.q2.
Determine and discuss one way that tourism has diminished : determine and discuss one way that tourism has diminished regional landscape
The general determining factor in whether a person gets : the general determining factor in whether a person gets sentenced to jail or to prison depends upon the offense they
Draw the first five figures in a sequence of figures whos : draw the first 5 figures in a sequence of figures whos nth entry is made of 4n 1 smilers circles. describe how
The pbmc condominium association has directed you to draw : present the following scenarioas the security manager of the large upscale waterfront 125-unit 10-story condominium

Reviews

Write a Review

Computer Engineering Questions & Answers

  Decreasing risk of malicious attacks

While a large percentage of the information technology security budgets is devoted to decreasing the risk of malicious attacks, there exist other ways in which systems or data become damaged.

  Different internet access systems

Different Internet access systems are asymmetric, with the higher downstream speeds rather than the upstream speeds. Is this better for the client PC access to web servers? Explain. Does it matter for the client access to the e-mail servers? Explain.

  What is the cookie

What is a cookie? What are advantages and disadvantages of using cookies in a web application.

  Design c++ program to accept an n*m matrix

Write down a C++ program to accept an n*m matrix containing only 0 and 1 values, and then find it's biggest zero submatrix i.e. the biggest submatrix in which all the values are 0.

  Program prompts the user to input three numbers

Write the program that prompts the user to input three numbers. The program should then output the numbers in ascending order.

  Choose an organization from the choices provided and

choose an organization from the choices provided and prepare an organization security plan that provides security

  Make perl script in order to display a basic web page

design a Perl script in order to display a basic Web page and display system information that is dynamic using Perl on the screen such as date and time as well as the host and how long system has been up.

  Choose one of the major areas of middleware graphics ai

choose one of the major areas of middleware graphics ai networking sound movie animation physics. research the major

  Explain what the hazard detection unit is doing

You are to identify the problems, if any, which may be encountered in the pipeline. If you do identify any problems you are to explain them by using the instruction format terms , , for those instructions where there are problems.

  Question 1explain why worst-case fair wfq can have the

question 1explain why worst-case fair wfq can have the absolute fairness bound.question 2consider wfq weighted fair

  What are the main concepts in the materials covered

The concepts of recursive descent parsing (implementing a procedure for each nonterminal): Write your own questions. I would want to see diversity from you all.

  Consider a design tool used in the construction

How is web content developed? What are some of the popular design tools in use today? Can you identify a design tool used in the construction of the website MSN.com.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd