Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain signed binary number system.
Ans.
Signed Binary Numbers: In decimal number system positive numbers are signified by (+) sign and negative numbers are represented by negative sign Digital circuits understand only the language of 0's and 1's. Therefore normally an additional bit is utilized for sign and this is placed at the most significant position.
1. A 'O' is utilized for positive numbers and 1 is for negative numbers. For illustration an eight bit signed number 00000100 shows +4 and 10000100 shows (-4). This representation is termed as sign magnitude number. Three various ways by that signed numbers are presented are given.
2. One's compliment representation: In this system the positive numbers are shown by their Binary equivalent with a 0 placed on most significant position to represent the negative numbers compliment is taken and than a '1' is placed as MSB to represent the negative sign. For illustration
+7 = (0111)2
- 7 = (1000)2
3. Two's Compliment presentation: If 1 is added number is termed as I's compliment of the binary number. For illustration 2's compliment representation of 0101 is 1011. Because 0101 shows (+5)10 hence 1011 shows (-5)10 in two's compliment representation.
When the set of input data to an even parity generator is 0111, the output will be ? Ans. Into even parity generator if number of one is odd then output will be 0.
code for padovan string problem
Determine the concepts of Object Oriented Analysis In OOA the initial focus is on identifying objects from the application domain, after that fitting those procedures around
N number of XNOR gates is linked in series that is the N inputs (A0, A1, A2......) are specified in the subsequently way: A0 and A1 to first XNOR gate and A2 and O/P of First XNOR
What are the two approaches used for generating the control signals in proper sequence? Hardwired control Micro programmed control
Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.
The ?rst task in the project is to develop a sane system to store change logs and versions of ?les. The simplest approach is to create a "dot" directory in the location of the ?le
Evaluate x = A ‾.B + C ( ) using the convention A = True and B = False. Ans. Simplify given expression x = A ‾ .B + C ( ) as = A ‾ B + C (A ‾ + D ‾ ) (As = A ‾ +D ‾ usin
How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a
Explain the stack storage allocation model. In a stack-based allocation, all objects are allocated in last-in, first-out data structure and a stack. For example: Recursive subr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd