Binary number system using 8 bit registers, Computer Engineering

Assignment Help:

Q. Binary number system using 8 bit registers?

Add 25 and -30 in binary number system using 8 bit registers using:

  • Signed magnitude representation
  • Signed 1's complement
  • Signed 2's complement

Solution:

873_Binary number system using 8 bit registers.png

To do arithmetic addition with one negative number only we should check magnitude of numbers. The number having smaller magnitude is then subtracted from larger number and sign of bigger number is selected. Implementation of such a technique in digital hardware will need a long sequence of control decisions and circuits which will add and compare and subtract numbers. Is there a better substitute than this technique? Let's first try signed 2's complement.

815_Binary number system using 8 bit registers1.png

Now let's do addition using signed 2's complement notation:

349_Binary number system using 8 bit registers2.png

Please note how easy it is to add 2 numbers employing signed 2's Complement. This method requires just one control decision and just one circuit for adding two numbers however it puts on extra condition that negative numbers must be stored in signed 2's complement notation in registers. This can be obtained by complementing positive number bit by bit and then incrementing resultant by 1 to get signed 2's complement.


Related Discussions:- Binary number system using 8 bit registers

Illustrate about fifth generation electronic computers, Fifth Generation (1...

Fifth Generation (1984-1990) The advancement of the next generation of computer systems is characterized majorly by the acceptance of parallel processing.  Until this time para

How firewalls operate, Firewalls operate by Creening packets to/from th...

Firewalls operate by Creening packets to/from the Network and give controllable filtering of network traffic.

What is public key cryptography, What is Public Key Cryptography Publi...

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret

When will the current screen processing terminates, When will the current s...

When will the current screen processing terminates? A current screen processing terminates when control reaches either a Leave-screen or the end of PAI.

Implement that function using only nand gates, Q. Find simplified function ...

Q. Find simplified function F and implement that function using only NAND gates. 1.  F(A,B,C) = (A+B) (A'+B+C') (A'+B'+C') 2.  F (A,B,C,D) = A'B'C'+B'CD'+A'BCD'+AB'C' 3.

Explain the significance ipv6 over ipv4, Explain the significance IPV6 over...

Explain the significance IPV6 over IPV4. The maximum size of an Ipv6 datagram is 65575 bytes, with the 0 bytes Ipv6 header. Ipv6 also describe a minimum reassembly buffer size:

Principles of logic circuits, A logic gate is an electronic circuit that ge...

A logic gate is an electronic circuit that generates a typical output signal which depends on its input signal. Output signal of a gate is a general boolean operation of its input

A sorting algorithm is stable, A sorting algorithm is stable if  Preser...

A sorting algorithm is stable if  Preserves the original order of records with equivalent keys.

Loogen, i need u to write my exam for $10,000

i need u to write my exam for $10,000

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd