Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Floating Point Representation?
Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called mantissa and second part signifies decimal or binary point position and is called an Exponent. Mantissa can be an fraction or simply an integer. Please keep in mind that position of decimal or binary point is presumed and it's not a physical point thus wherever we are representing a point it's only assumed position.
A decimal + 12.34 in a distinctive floating point notation can be signified in any of subsequent two forms:
This number in any of above forms (if represented in BCD) needs 17 bits for mantissa (1 for sign and 4 every decimal digit as BCD) and 9 bits for exponent (1 for sign and 4 for every decimal digit as BCD). Please note the exponent denotes correct decimal location. In first case where exponent is +2 denotes that actual position of decimal point is two places to right of assumed position whereas exponent- 2 denotes that assumed position of point is two places in the direction of left of assumed position. The assumption of position of point is generally same in a computer resulting in a consistent computational environment.
Floating-point numbers are frequently represented in normalised forms. A floating point number whose mantissa doesn't comprise zero as most significant digit of number is considered to be in normalised form. For illustration a BCD mantissa + 370 that is 0 0011 0111 0000 is in normalised form since these leading zero's aren't part of a zero digit. On the other hand a binary number 0 01100 isn't in a normalised form. The normalised form of this number is:
Types of reasoning - First-order logic: Atleast five types of reasoning can be acknowledged here. • Firstly, why and how do we will think for the killer usually left a silk
Categorize the CPU scheduling algorithms? The various CPU scheduling algorithms are categorized as given below:
Q. How are comparisons done in 8086 assembly language? There is a compare instruction CMP. Though this instruction just sets the flags on comparing two operands (both 16 bits
Use linear activation function and Hebbian learning for a SLFF network to attempt to learn the following two sets of patterns. Why can the patterns be learned, or why can they not
The Orbix Connect resource adapter is packaged as a standard J2EE Connector Architecture resource adapter archive (RAR) file, corbaconn.rar. The corbaconn.rar file having all the c
RST 4.5 is known as TRAP.
? Object: The interaction among objects takes place in a system. An object is depicted by a rectangle with the name of the object, preceded by a colon and underline. ? Relation
voltage,current and power relation in a delta connection
Q. Write Policy of cache memory? If contents of a block in cache are changed then it's essential to write it back to main memory before replacing it. Write policy determines wh
Parallelism Conditions As discussed earlier, parallel computing needs the segments to be executed in parallel should be independent of each other. So before executing paralleli
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd