Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Now let's define range which a normalised mantissa can signify. Let's presume that our present representations has normalised mantissa so left most bit can't be zero so it has to be 1. So it's not required to store this first bit and it's being presumed implicitly for number. So a 23-bit mantissa can signify 23 + 1 = 24 bit mantissa in our representation.
So smallest mantissa value can be:
Implicit first bit as 1 followed by 23 zero's which is
0.1000 0000 0000 0000 0000 0000
Decimal equivalent = 1 × 2-1 = 0.5
Maximum value of mantissa:
Implicit first bit 1 followed by 23 one's which is
0.1111 1111 1111 1111 1111 1111
Decimal equivalent:
For finding binary correspondent let's add 2-24 to above mantissa as below
Binary: 0.1111 1111 1111 1111 1111 1111
what is area subdivision and working
One's Complement Operator: ~ The one's complement operator, sometimes called the "bitwise complement" or "bitwise NOT" operator, produces the bitwise one's complement of its op
Need help in class assignment !! i have only 24 hours!!
What is the working set of a process? The set of pages that are referred by the method in the last "n", references, where "n" is called the window of the working set of the pro
An object model for university system Establishing relationship among various classes in the system is the primary activity. Here, we have a simple model of a University System
Convert decimal 153 to octal. Equivalent in octal will be ? Ans. (153) 10 = (231) 8
Unity / variety Unity is created by the use of elements that look like they belong together, in other words the piece will have a feeling of internal consistency. The most
What is an I/O Interface? Input-output interface provides a method for transferring binary information among internal storage, like memory and CPU registers, and external I/O d
data associate to a class is called a ....?
Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd