Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Binary number system using 8 bit registers?
Add 25 and -30 in binary number system using 8 bit registers using:
Solution:
To do arithmetic addition with one negative number only we should check magnitude of numbers. The number having smaller magnitude is then subtracted from larger number and sign of bigger number is selected. Implementation of such a technique in digital hardware will need a long sequence of control decisions and circuits which will add and compare and subtract numbers. Is there a better substitute than this technique? Let's first try signed 2's complement.
Now let's do addition using signed 2's complement notation:
Please note how easy it is to add 2 numbers employing signed 2's Complement. This method requires just one control decision and just one circuit for adding two numbers however it puts on extra condition that negative numbers must be stored in signed 2's complement notation in registers. This can be obtained by complementing positive number bit by bit and then incrementing resultant by 1 to get signed 2's complement.
Consider the following linear programming problem: Minimize: 70M + 40N Subject to: 3M + 7N ≥ 233 10M + 2N ≥ 254
Why is the Wait-For-Memory-Function-Completed step required when reading from or writing to the main memory? WMFC step is needed for the write control signal / read control si
Q. Explain IP Address Structure? Internet addresses are divided in five types of classes. Classes were designated A through E. class A address space enables a small number of n
Laptop computers Laptop computers have the obvious advantage over desk-top computers (PCs) in that they are fully portable. This is of specific value if a user wishes to do wor
1. Create the following ADTs. (a) Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk: i. makestk returns a new stack
Draw and elucidate the block diagram of programmable interrupt controller 8259. The 8259A adds 8 vectored priority encoded interrupts to microprocessor. It can be expanded to 6
Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.
Define Mercantile Process Model from the Merchant’s perspective along with a suitable diagram. This model consists of three activities into the purchase consummation phase: Aut
In the past there was a large gap between speed of a memory andprocessor. So a subroutine execution for an instruction for illustration floating point addition may have to follow a
Q. What do you mean by Daisy chain? This scheme provides a hardware poll. With this scheme, an interrupt acknowledge line is chain by different interrupt devices. All I/O inter
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd