Floating point representation in memory, Computer Networking

Assignment Help:

Floating Point Representation in Memory

1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?

2. a) Define a structure to store roll no, name and marks of a student.

b) Using the structure of Q2. a), above write a 'C' program to create a file "student.dat". There must be one record for every student in the file. Accept the data from the user.

c) Using the "student.dat" of Q2. b), above write a 'C' program to search for the details of the student whose name is entered by the user.

 3. How is communication between computers established in Internet. What characteristics need to be defined in a communication protocol? Explain the physical and logical paths in a computer communication network also.


Related Discussions:- Floating point representation in memory

Was the entire transaction completed, The following information was obtaine...

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

Who initiates the ‘trap'' message, Question 1 Who initiates the ‘Trap' mes...

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

Describe full-duplex transmission, Full Duplex - Capability for simultaneou...

Full Duplex - Capability for simultaneous data transmission among a sending station and a receiving station. It needs a workstation be attached to a switch, the NIC must support it

What is workstation, What is workstation? A workstation is a node in ne...

What is workstation? A workstation is a node in network that is more useful and can occur local information processing or graphics processing. A workstation generally has an in

Layer of security, Other than performance  issues, there could be security ...

Other than performance  issues, there could be security reasons for using something like xinetd.  Make simple design in which a new version of xinetd gives a layer of security.

What do you use the aux port for, The auxiliary port is used to link a mode...

The auxiliary port is used to link a modem to for dial backups.

Calculate data bandwidth requirements, XYZ company's executives have approa...

XYZ company's executives have approached you to architect, design, and recommend if they should use an IP network infrastructure for all their applications. Here is some informa

Osi reference model, - The model was developed by the ISO (International Or...

- The model was developed by the ISO (International Organisation for Standardisation) in 1984. It is currently considered the primary Architectural model for inter-computer communi

Parts count method calculation, M E T HOD OF CALCULATION It involves...

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Write examples of the transport layer, Example of transport layer are:- ...

Example of transport layer are:- a) TCP is connection oriented. b) UDP is connectionless

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd