Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Floating Point Representation?
Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called mantissa and second part signifies decimal or binary point position and is called an Exponent. Mantissa can be an fraction or simply an integer. Please keep in mind that position of decimal or binary point is presumed and it's not a physical point thus wherever we are representing a point it's only assumed position.
A decimal + 12.34 in a distinctive floating point notation can be signified in any of subsequent two forms:
This number in any of above forms (if represented in BCD) needs 17 bits for mantissa (1 for sign and 4 every decimal digit as BCD) and 9 bits for exponent (1 for sign and 4 for every decimal digit as BCD). Please note the exponent denotes correct decimal location. In first case where exponent is +2 denotes that actual position of decimal point is two places to right of assumed position whereas exponent- 2 denotes that assumed position of point is two places in the direction of left of assumed position. The assumption of position of point is generally same in a computer resulting in a consistent computational environment.
Floating-point numbers are frequently represented in normalised forms. A floating point number whose mantissa doesn't comprise zero as most significant digit of number is considered to be in normalised form. For illustration a BCD mantissa + 370 that is 0 0011 0111 0000 is in normalised form since these leading zero's aren't part of a zero digit. On the other hand a binary number 0 01100 isn't in a normalised form. The normalised form of this number is:
COMPUTER FUNDAMENTALS 1. Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conduc
Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve
Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using K-maps Ans. The logic function minimization of F(A, B, C, D) = ∑ m(1,3,5,8,9,11.15) + d(2,13) by
Define Congestion. Congestion: This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telecommunication system. Inside
what is structure tensor?how we calculate for image pixel?
Convenience of Environments -artificial intelligence: In some cases, some aspects of an environment which should be taken into account in decisions about actions may be unavai
You presently work for an automotive parts supply store. Your company is growing, and is considering expansion. The company presently has three locations (North, South, and Central
Question: (a) Assume you are a taxi driver. Your taxi can hold four passengers. Passengers pay a flat fee for a ride to the airport, so your goal is to pick up four passengers
Illustrate the categories of micro computers Micro computers are usually categorized into desktop models and laptop models. They are awfully limited in what they can do when c
Data Routing Functions The data routing functions are the functions which when implemented the path among the source and the objective. In dynamic interconnection networks the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd