Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Floating Point Representation?
Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called mantissa and second part signifies decimal or binary point position and is called an Exponent. Mantissa can be an fraction or simply an integer. Please keep in mind that position of decimal or binary point is presumed and it's not a physical point thus wherever we are representing a point it's only assumed position.
A decimal + 12.34 in a distinctive floating point notation can be signified in any of subsequent two forms:
This number in any of above forms (if represented in BCD) needs 17 bits for mantissa (1 for sign and 4 every decimal digit as BCD) and 9 bits for exponent (1 for sign and 4 for every decimal digit as BCD). Please note the exponent denotes correct decimal location. In first case where exponent is +2 denotes that actual position of decimal point is two places to right of assumed position whereas exponent- 2 denotes that assumed position of point is two places in the direction of left of assumed position. The assumption of position of point is generally same in a computer resulting in a consistent computational environment.
Floating-point numbers are frequently represented in normalised forms. A floating point number whose mantissa doesn't comprise zero as most significant digit of number is considered to be in normalised form. For illustration a BCD mantissa + 370 that is 0 0011 0111 0000 is in normalised form since these leading zero's aren't part of a zero digit. On the other hand a binary number 0 01100 isn't in a normalised form. The normalised form of this number is:
A class that has no functionality of its own is an Adaptor class in C++. Its member functions hide the use of a third party software component or an object with the non-compatible
How do you control instructions like branch, cause problems in a pipelined processor? Pipelined processor gives the best throughput for sequenced line instruction. In branch in
Take the following flow graph and use the procedure in chapter 8 to derive an equivalent regular expression. Show all intermediate graphs (to ensure that you follow the procedure,
Firewalls operate by Creening packets to/from the Network and give controllable filtering of network traffic.
Q. Basic defination of program? A program generally consists of a set of instructions and data specifying the solution of a particular problem. Programs (and data) expressed in
what is distortion
Determine the firewall in Intranet technology Firewall remains the basic foundation of Internet and Intranet security, for many users getting into the corporate Intranet would
Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer
Program about railway reservation system using structure . Get 10 names,their gender ,address , seats availability according to trains and some extra datas
Do you provide storage and destruction services? We will assess your storage and destruction needs as part of our evaluation process. Our destruction services can be performed
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd