Additions of two numbers by using 2’s complement, Computer Engineering

Assignment Help:

Add -20 to +26 by using 2's complement ?

Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is,
               20 =  0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)

              1627_Additions of two numbers by using 2’s complement.png= 1 1 1 0 1 0 1  1  (1's complement)
                                         +1
           -------------------------------

        1627_Additions of two numbers by using 2’s complement.png= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20)
               +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26)
           ----------------------------- Addition of -20 to +26
              = +6 = 0 0 0 0 0 1 1 0
           ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.

 


Related Discussions:- Additions of two numbers by using 2’s complement

Explain fixed point representation, Q. Explain Fixed Point Representation? ...

Q. Explain Fixed Point Representation? The fixed-point numbers in binary has a sign bit. A positive number has a sign bit 0 whereas negative number has a sign bit 1. In fixed-p

We declare a table control in the abap/4 program, How can we declare a tabl...

How can we declare a table control in the ABAP/4 program? Using the syntax controls type tableview using screen .

Elements of composition, The Elements of composition are the formal languag...

The Elements of composition are the formal language used to communicate in the visual arts. The elements of composition can be loosely broken into 5 main elements, Line, shape, val

Hidden input, Yet another type of input is HIDDEN input. A HIDDEN in...

Yet another type of input is HIDDEN input. A HIDDEN input is a value/name pair which is returned to you but doesn

Specifying the problem - learning decision trees, Specifying the Problem: ...

Specifying the Problem: Now next here furtherly we now use to look at how you mentally constructed your decision tree where deciding what to do at the weekend. But if one way

Limitations of execution of instructions, Q. Limitations of execution of in...

Q. Limitations of execution of instructions? 1. Size of memory shown in 16 words while instruction is capable of addressing 210 =1 K words of Memory. However why 210 since 10 b

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

Develop an object-oriented design, Investigate the MIPS programmers model a...

Investigate the MIPS programmers model and develop an object-oriented design that will reflect aspects of the MIPS architecture. Consider the functional units of the architecture a

Illustrate basic working of physical layer, Q. Illustrate basic working of ...

Q. Illustrate basic working of Physical layer? Physical layer: Physical layer is concerned with sending raw bits between source and destination nodes over a physical medium.

Dhcp, how to set up dhcp

how to set up dhcp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd