Illustrate character coded data, Computer Engineering

Assignment Help:

Q. Illustrate Character Coded Data?

The input output happens in the form of ASCII data. These ASCII characters are entered as a string of data. For illustration to get two numbers from console we can enter numbers as:

1596_Illustrate Character Coded Data.png

As every digit is inputwe will store its ASCII code in a memory byte. After first number was input number will be stored as follows:

Number is entered as:

463_Illustrate Character Coded Data1.png

Every one of these numbers would be input as equivalent ASCII digits and required be converted either to digit string to a 16-bit binary value which can be used for computation or the ASCII digits themselves can be added that can be followed by instruction which adjust the sum to binary. Let's use conversion operation to perform these calculations here.

Another significant data format is packed decimal numbers (packed BCD). A packed BCD comprises two decimal digits per byte. Packed BCD format has subsequent advantages:

  • BCD numbers permit accurate calculations for nearly any number of significant digits.
  • Conversion of packed BCD numbers to ASCII (and vice versa) is relatively fast.
  • An implicit decimal point can be used for keeping track of its position in a separate variable.

The instructions DAA (decimal adjust after addition) as well as DAS (decimal adjust after subtraction) are used for adjusting result of an addition of subtraction operation onpacked decimal numbers. Though no such instruction exists for division andmultiplication. For the cases of division and multiplication the number should be unpacked. First divided or multiplied and packed again.


Related Discussions:- Illustrate character coded data

How does cpu know that an interrupt has taken place, How does CPU know that...

How does CPU know that an interrupt has taken place? There needs to be a line or a register or status word in CPU which can be increased on occurrence of interrupt situation.

Explain the action-object matrix, Explain the Action-object matrix A...

Explain the Action-object matrix A matrix showing how update actions influence objects.  It may be considered to be part of user object model as it summarizes user object ac

How many flip-flops are required to construct mod 30 counter, How many flip...

How many flip-flops are required to construct mod 30 counter ? Ans. Mod - 30 counter +/- requires 5 Flip-Flop as 30 5 . Mod - N counter counts overall ' N ' number of state

Illustrate working of pocket and pc-card modems, Q. Illustrate working of P...

Q. Illustrate working of Pocket and PC-Card Modems? Pocket Modems: Small external Modems used with notebook PCs.  PC-Card Modems:  PC and Modems are read with PCMCIA slots w

What is parallel loop construct, Q. What is Parallel Loop Construct? Pa...

Q. What is Parallel Loop Construct? Parallel loop construct is a shortcut for specifying parallel construct comprising one loop construct and no other statements. The syntax of

Cell array variable , a)   Make a cell array variable that would kept for a...

a)   Make a cell array variable that would kept for a student his or her name, university id number, and GPA.  Print this information. b) Make a structure variable that would kept

Make your simulation run faster, Ameliorating the mechanical delays of seek...

Ameliorating the mechanical delays of seeks and rottion are usually regardeed as major aspects of device drivers for disks. The simplest way for a disk device driver to service dis

Explain the term- scan insertion, Explain the term- Scan Insertion Sca...

Explain the term- Scan Insertion Scan Insertion is completed by a tool and results in all (or most) of your design's flip-flops to be changed by special "Scan Flip-flops". Sca

Describe about physical systems, Q. Describe about Physical Systems? Ph...

Q. Describe about Physical Systems? Physical Systems are tangible entities which may be dynamic or static.   Computer Systems, Buildings,Vehicles etc. are illustrations of p

Secure systems development, Write an academic report on a significant softw...

Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example: The nature of the software vuln

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd