Binary floating-point number range, Computer Engineering

Assignment Help:

Q. Binary floating-point number range?

Smallest Negative number

  Maximum mantissa and maximum exponent

    =    - (1 -2-24) × 2127

 Largest negative number

  Minimum mantissa and Minimum exponent

    = -0.5 × 2-128

 Smallest positive number 

    = 0.5 × 2-128

Largest positive number

    = (1 -2-24) × 2127

398_Binary floating-point number range.png

Figure: Binary floating-point number range for given 32 bit format

In floating point numbers basic transaction is between range of numbers and accuracy also known as precision of numbers. If we raise exponent bits in 32-bit format then range can be increased but accuracy of numbers would go down as size of mantissa would become smaller. Let's have an illustration that will elucidate term precision. Suppose we have one bit binary mantissa then we would be able to represent only 0.10 and 0.11 in normalised form as provided in above illustration (having an implicit 1). Values like 0.101, 0.1011 and so on can't be represented like complete numbers. Either they have to be estimated or truncated and would be represented as either 0.10 or 0.11. So it will produce a truncation or round off error. The higher the number of bits in mantissa better would be precision.

In case of floating point numbers for raising both precision and range more bits are required. This can be obtained by employing double precision numbers. A double precision format is generally of 64 bits.

Institute of Electrical and Electronics Engineers (IEEE) is a group that has created many standards in aspect of various aspects of computer has created IEEE standard 754 for floating-point representation and arithmetic. Fundamental aim of developing this standard was to facilitate portability of programs from one to another computer. This standard has resulted in growth of standard numerical capabilities in different microprocessors. This representation is displayed in figure below.

2060_Binary floating-point number range1.png

Figure: IEEE Standard 754 format


Related Discussions:- Binary floating-point number range

Explain the necessary conditions for deadlock to occur, Explain the necessa...

Explain the necessary conditions for deadlock to occur. Conditions for deadlock to arise are: i. Mutual exclusion: At least one resource must be held in a non-sharable mo

What is java applet, A Applet is a java program that runs within a web brow...

A Applet is a java program that runs within a web browser.

Determine the primary memory of the server, Determine the primary memory of...

Determine the primary memory of the server The keys used for accessing the server are held at a secret location in the primary memory of the server. This area or location is hi

Role of bitmap indexes to solve aggregation problems, Describe about the ro...

Describe about the role of bitmap indexes to solve aggregation problems? Ans) Bitmaps are very useful in begin schema to join large databases to small databases. Answer queries

Name a different return types of a controller action method, The following...

The following are just a few return types of a controller action process. In common an action process can return an instance of an any class that derives from Action Result class.

What is concurrent control, What is concurrent control? Control resides...

What is concurrent control? Control resides concurrently in various independent objects, every a separate task. A task can wait for input but other task continues implementatio

How many two-input AND and OR gates are required to realize , How many two-...

How many two-input AND and OR gates are required to realize Y=CD+EF+G ? Ans. Y=CD+EF+G No. of two i/p AND gates=2 No. of two i/p OR gates = 2 One OR gate to OR CD and EF

Exit the loop on end-of-file, Continuing in main, write a loop that will re...

Continuing in main, write a loop that will read from the ifstream that reads enough information to  create a person object (i.e. first name, last name, and weight).  Exit the loop

Differentiate between public key and secret key encryption, What are the di...

What are the different between Public Key Encryption and Secret Key Encryption? Differentiate between Public Key Encryption and Secret Key Encryption: A cryptographic sys

What is content addressable memory, What is content addressable memory? ...

What is content addressable memory? The memory unit accessed by the content is known as an associative memory or content addressable memory. This type of memory is accessed con

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd