Conversion of decimal number 82.67 to its binary equivalent, Computer Engineering

Assignment Help:

Conversion of Decimal number 82.67 to its Binary Equivalent

Ans. Firstly see the integer part 82 and determine its binary equivalent  as

942_Conversion of Decimal number 82.67 to its Binary Equivalent.png

The Binary equivalent is (1010010)2

After that taking the fractional part that is, 0.67

Fraction

Fraction X 2

Remainder New Fraction

Integer

0.67

1.34

0.34

1

0.34

0.68

0.68

0

0.68

1.36

0.36

1

0.36

0.72

0.72

0

0.72

1.44

0.44

1

0.44

0.88

0.88

0

0.88

1.76

0.76

1

0.76

1.52

0.52

1


This is seen that, this is impossible to find a zero as remainder still after 8 stages. The process carried on further on an approximation can be completed and the process is ended here.
The binary equivalent is 0.10101011.
Thus, the binary equivalent of decimal number which is 82.67 is (1010010.10101011)2


 


Related Discussions:- Conversion of decimal number 82.67 to its binary equivalent

Compare memory mapped i/o with i/o mapped i/o, Compare memory mapped I/O wi...

Compare memory mapped I/O with I/O mapped I/O. Memory Mapped I/O Scheme: In this scheme there is only one address space. Address space is stated as all possible addresses tha

C LANGUAGE, 4) A positive integer is entered through the keyboard;write a ...

4) A positive integer is entered through the keyboard;write a function to find the binary equivalent of this number using recursion.

What is the difference among a canvas and a scroll panel, Canvas is a compo...

Canvas is a component. ScrollPanel is a container. Canvas is a rectangular area where the application can draw or trap input events. ScrollPane executes horizontal and vertical scr

Briefly explain array processing in detail, Array Processing We have se...

Array Processing We have seen that for executing vector operations the pipelining conception has been used. There is other method for vector operations. If we have array of n p

What are the authentication methods in .net, What are the authentication me...

What are the authentication methods in .NET?   1. WINDOWS AUTHENTICATION 2. FORMS AUTHENTICATION 3. PASSPORT AUTHENTICATION The authentication option for the ASP.N

Briefly explain register-to-register architecture, Register-to-Register Arc...

Register-to-Register Architecture In this organization results and operands are not accessed straight from main memory by scalar or vector registers. The vectors that are neede

Why gateways are used during mail transfer, Why Gateways are used during ma...

Why Gateways are used during mail transfer? Email using SMTP effort best while both the sender and the receiver are on the internet and can hold TCP connections in between send

Perform division in binary showing contents of accumulator, Q. Perform divi...

Q. Perform division in binary showing contents of accumulator, B register and Y register during each step. (Accumulator, B, Y are 5-bit registers) 13 / 2

Dfd, Give a 5-minute presentation on your team''s solution

Give a 5-minute presentation on your team''s solution

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd