Additions of two numbers by using 2’s complement, Computer Engineering

Assignment Help:

Add -20 to +26 by using 2's complement ?

Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is,
               20 =  0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)

              1627_Additions of two numbers by using 2’s complement.png= 1 1 1 0 1 0 1  1  (1's complement)
                                         +1
           -------------------------------

        1627_Additions of two numbers by using 2’s complement.png= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20)
               +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26)
           ----------------------------- Addition of -20 to +26
              = +6 = 0 0 0 0 0 1 1 0
           ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.

 


Related Discussions:- Additions of two numbers by using 2’s complement

How transmission bridges help in satisfying the connectivity, How do tra...

How do transmission bridges help in satisfying the connectivity? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of

Which method uses the greatest number of layers in OSI model, Which method ...

Which method uses the greatest number of layers in the OSI model? Gateway utilizes the greatest number of layers into the OSI model.

What are the categories of radio communication, What are the categories of ...

What are the categories of Radio communication 1.  Sky wave or ionosphere communication 2.  Line-of-sight (LOS) microwave communication limited by horizon 3.  Troposphere

Illustrate an object model for university system, An object model for unive...

An object model for university system Establishing relationship among various classes in the system is the primary activity. Here, we have a simple model of a University System

Risc approach - computer architecture, RISC Approach - computer architectur...

RISC Approach - computer architecture: The RISC processors only use easy instructions that can be executed within one clock cycle. therefore, the "MULT" command discussed abov

Role of internet, Role of Internet, Intranet and extranet in e-business ...

Role of Internet, Intranet and extranet in e-business The following information activities are carried out in many business: 1.  Selling of raw materials 2.  Advertising o

Ict, how to become an ict enginer

how to become an ict enginer

What is cmp instruction, What is CMP instruction Comparison instruction...

What is CMP instruction Comparison instruction (CMP) is a subtraction that changes only the flag bits; destination operand never changes. A comparison is useful for checking th

Define wait protocol, Q. Define Wait protocol? The wait protocol is use...

Q. Define Wait protocol? The wait protocol is used for resolving conflicts that arise due to some multiprocessors requiring same resource. There are 2 kinds of wait protocols:

What is roll area, What is roll area? A roll area having the program's...

What is roll area? A roll area having the program's runtime context.  In addition to the runtime stack and other structures, all local variables and any data known to the prog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd