Binary number system using 8 bit registers, Computer Engineering

Assignment Help:

Q. Binary number system using 8 bit registers?

Add 25 and -30 in binary number system using 8 bit registers using:

  • Signed magnitude representation
  • Signed 1's complement
  • Signed 2's complement

Solution:

873_Binary number system using 8 bit registers.png

To do arithmetic addition with one negative number only we should check magnitude of numbers. The number having smaller magnitude is then subtracted from larger number and sign of bigger number is selected. Implementation of such a technique in digital hardware will need a long sequence of control decisions and circuits which will add and compare and subtract numbers. Is there a better substitute than this technique? Let's first try signed 2's complement.

815_Binary number system using 8 bit registers1.png

Now let's do addition using signed 2's complement notation:

349_Binary number system using 8 bit registers2.png

Please note how easy it is to add 2 numbers employing signed 2's Complement. This method requires just one control decision and just one circuit for adding two numbers however it puts on extra condition that negative numbers must be stored in signed 2's complement notation in registers. This can be obtained by complementing positive number bit by bit and then incrementing resultant by 1 to get signed 2's complement.


Related Discussions:- Binary number system using 8 bit registers

Explain the operation of 8:1 multiplexer, Explain the operation of 8:1 mult...

Explain the operation of 8:1 multiplexer. Ans: In this multiplexer 8 Input and 1 Output and three select lines i.e. S 2 , S 1 , S 0 are given. Any one of the inputs will be

Explain how presentation layer helps in establishing, Explain how presentat...

Explain how presentation layer helps in establishing and processing data in End to End layers. The idea of the presentation layer is to stand for information to the communicati

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

What do you mean by internet, Q. What do you mean by Internet? Ans: In...

Q. What do you mean by Internet? Ans: Internet is a network of networks or collection of networks. Several networks such as WAN and LAN connected through suitable hardware an

Explain about diodes, Q. Explain about Diodes? A single pn-junction wit...

Q. Explain about Diodes? A single pn-junction with appropriate contacts for connecting the junction to external circuits is called a semiconductor pn-junction diode. The fundam

Distinguish between an agent system and an expert system, Problem : (a)...

Problem : (a) The concept of an agent is generally defined by listing the properties that agents exhibit. Identify and describe the properties that you would associate with th

Features of an expert system, The heart of an experts systems is the ...

The heart of an experts systems is the powerful corups of knowledge that accumulates during system building. The knowledge is explicit and organized to simplify decisio

Describe the basic aspects of ENIAC, Q. Describe the basic aspects of ENIAC...

Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was

Mating - canonical genetic algorithm, Mating: Therefore once our GA ag...

Mating: Therefore once our GA agent has chosen the individuals lucky sufficient as actually there  fit enough to produce offspring then we next determine how they are going to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd