Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Displays a format of floating-point number?
A floating binary number +1010.001 in a 16-bit register is able to be represented in normalised form (presuming 6 bits for exponent and 10 bits for mantissa).
A zero can't be normalised as all digits in mantissa in this case have to be zero.
Arithmetic operations involved with floating point numbers are more complicated in nature take longer time for execution and need complex hardware. Yet floating-point representation is a necessity as it's helpful in scientific calculations. Real numbers are generally represented as floating point numbers.
The below figure displays a format of a 32-bit floating-point number.
Figure: Floating Point Number Representation
What is IPC? What are the various schemes available? The term IPC (Inter-Process Communication) explains various ways by which different process running on some operating syste
Explain the life cycle of a process Each procedure has a life cycle, which consists of execution, creation and termination phases of the procedure. A method may create severa
General Concepts of links and association A link is a conceptual or physical connection among objects for instance. Mathematically, you can define a link as a tuple which is a
Minimize the logic function Y(A, B, C, D) = ∑m(0,1,2,3,5,7,8,9,11,14). Use Karnaugh map. Draw logic circuit for the simplified function. Ans: In following figure (a) shows the
Differentiate between Transport and Session layers of OSI model. OSI Model Transport Layer The transport layer utilizes the services provided through the network layer, as
Name the four steps in pipelining. Fetch : Read the instruction from the memory. Decode : Decode the instruction and get the source operand. Execute : Perform the operat
MAC is the abbreviation for: (A) Multimedia access control (B) Media access control (C) Mobile access control (D) Master access point control Ans: MAC is th
(a) Why did SAP introduce the extended star schema? Explain why it is reported to be better than the traditional schema model? (b) What is the difference between a dimension use
Explain network security. Network security means the security of networks and their services from unauthorized access, changes, destruction or disclosure. It gives for assuranc
Which operations is performed more efficiently by doubly linked list than by singly linked list Deleting a node whose location is given.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd