How codes represent data for scientific calculations?, Computer Engineering

Assignment Help:

Q. How codes represent data for scientific calculations?

How codes are in fact used to represent data for scientific calculations?

The computer is a discrete digital device and stores information in flip-flops that are two state devices means in binary form. Fundamental requirements of computational data representation in binary form are:

  • Exponent
  • Representation of Magnitude
  • If number is fractional then decimal or binary point
  • Representation of sign

The solution for sign representation is easy since sign can be either negative or positive hence one bit can be used to signify sign. By default it must be left most bit (in most of the machines it's Most Significant Bit).

Therefore a number of n bits can be represented as n+l bit number where n+lth bit is sign bit and rest n bits signify its magnitude.

54_How codes represent data for scientific calculations.png

Figure: A (n  + 1) bit number


Related Discussions:- How codes represent data for scientific calculations?

Illustrate program on hypothetical machine, Q. Illustrate program on hypoth...

Q. Illustrate program on hypothetical machine? The program given in figure above is a hypothetical program which performs addition of numbers stored from locations 2001 onwards

Components of magnetic disk, Q. Components of magnetic disk? Disk itsel...

Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b

Home entertainment, Home Entertainment: E-commerce has led to HOME ENTE...

Home Entertainment: E-commerce has led to HOME ENTERTAINMENT. The video aspect usually includes a large-screen and/or high definition television or a projection system.

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer

Control traffic flowing in and out of the network, Firewalls use one or mor...

Firewalls use one or more of three methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are examined against a s

What are the types of smart cards used in e-commerce, What are the types of...

What are the types of Smart cards used in e-commerce? Generally there are 2 types of smart cards. Memory smart cards, which can be sighted as minuscule removable read/ write

Hazard (computer architecture), Hazard (computer architecture): In the...

Hazard (computer architecture): In the computer architecture, a hazard is a possible problem that can occurs in a pipelined processor. It concern to the possibility of erroneo

What are the steps comprised in authentication, What are the steps comprise...

What are the steps comprised in authentication? Steps in Authentication: The control over the access of the resources within the repository is exercised in two steps tha

Define parallel programming, Conventionally software has been written for s...

Conventionally software has been written for serial computation in that programs are written for computers which have a single Central Processing Unit (CPU). Here the problems are

Mathlab , Windy Grid World This assignment is to use Reinforcement Learni...

Windy Grid World This assignment is to use Reinforcement Learning to solve the following "Windy Grid World" problem illustrated in the above picture. Each cell in the image is a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd