Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Now let's define range which a normalised mantissa can signify. Let's presume that our present representations has normalised mantissa so left most bit can't be zero so it has to be 1. So it's not required to store this first bit and it's being presumed implicitly for number. So a 23-bit mantissa can signify 23 + 1 = 24 bit mantissa in our representation.
So smallest mantissa value can be:
Implicit first bit as 1 followed by 23 zero's which is
0.1000 0000 0000 0000 0000 0000
Decimal equivalent = 1 × 2-1 = 0.5
Maximum value of mantissa:
Implicit first bit 1 followed by 23 one's which is
0.1111 1111 1111 1111 1111 1111
Decimal equivalent:
For finding binary correspondent let's add 2-24 to above mantissa as below
Binary: 0.1111 1111 1111 1111 1111 1111
Q. What is Assembler? An assembly program is used to transfer assembly language mnemonics to binary code for every instruction after the complete program has been written with
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
Objectives of object oriented analysis After going through this unit, you should be able to: define the concepts of the objects in the system; express desired syste
This will be based on presentation of the report, complexity of the task, degree of completion and uniqueness of your problem. As a part of this question, you should also inclu
What is the most common biometrics? The most common biometrics is the given below: Face geometry (Photo): In this the computer takes the picture of your face and matches t
The Linux Process Scheduler uses time slice to prevent a single process from using the CPU for too long. A time slice specifies how long the process can use the CPU. In our simulat
What is the difference among super class and subclass in programming? Ans) A super class is a class that is inherited in programming while the sub class is a class that does th
What are the functions of dispatcher? There are four fuctions of dispatcher:- A) Equal distribution of transaction load to the work processes. B) Management of buffer a
what is cascade rollback
What are the Digital certificates of hardware computations Digital certificates are highly dependent on hardware computations, it is essential that mechanisms are evolved to i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd