Illustrate character coded data, Computer Engineering

Assignment Help:

Q. Illustrate Character Coded Data?

The input output happens in the form of ASCII data. These ASCII characters are entered as a string of data. For illustration to get two numbers from console we can enter numbers as:

1596_Illustrate Character Coded Data.png

As every digit is inputwe will store its ASCII code in a memory byte. After first number was input number will be stored as follows:

Number is entered as:

463_Illustrate Character Coded Data1.png

Every one of these numbers would be input as equivalent ASCII digits and required be converted either to digit string to a 16-bit binary value which can be used for computation or the ASCII digits themselves can be added that can be followed by instruction which adjust the sum to binary. Let's use conversion operation to perform these calculations here.

Another significant data format is packed decimal numbers (packed BCD). A packed BCD comprises two decimal digits per byte. Packed BCD format has subsequent advantages:

  • BCD numbers permit accurate calculations for nearly any number of significant digits.
  • Conversion of packed BCD numbers to ASCII (and vice versa) is relatively fast.
  • An implicit decimal point can be used for keeping track of its position in a separate variable.

The instructions DAA (decimal adjust after addition) as well as DAS (decimal adjust after subtraction) are used for adjusting result of an addition of subtraction operation onpacked decimal numbers. Though no such instruction exists for division andmultiplication. For the cases of division and multiplication the number should be unpacked. First divided or multiplied and packed again.


Related Discussions:- Illustrate character coded data

Cisc approach - cisc architecture, CISC Approach - CISC architecture: ...

CISC Approach - CISC architecture: The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardwa

What are the steps comprised in authentication, What are the steps comprise...

What are the steps comprised in authentication? Steps in Authentication: The control over the access of the resources within the repository is exercised in two steps tha

How address symbol table is generated, Address symbol table is generated by...

Address symbol table is generated by the  (A) memory management software.  (B) assembler.  (C) match logic of associative memory.   (D) generated by operating system

Digital logic, write a short note on the tri state ttl inverter

write a short note on the tri state ttl inverter

user to enter the weight, A red and blue car were involved in a head-on co...

A red and blue car were involved in a head-on collision. The red car was at a standstill and the blue car was possibly  speeding. Eye witness video recorded suddenly following the

Power and energy, Ask questiPower and EnergyQuestion 4Consider a processor ...

Ask questiPower and EnergyQuestion 4Consider a processor that runs at 2.5 GHz and 1 Volt. When running a given CPU-bound program,the processor consumes 100 W, of which 20 W is leak

What is parallel loop construct, Q. What is Parallel Loop Construct? Pa...

Q. What is Parallel Loop Construct? Parallel loop construct is a shortcut for specifying parallel construct comprising one loop construct and no other statements. The syntax of

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

What is asp.net authentication providers and iis security, What is ASP.NET ...

What is ASP.NET Authentication Providers and IIS Security? ASP.NET implements authentication using authentication providers, which are code modules that verify credentials and

Implementing protection with virtual memory, Implementing Protection with V...

Implementing Protection with Virtual Memory - computer architecture: To enable the operating system to implement protection in the VM system, the HW have to: I. Support at

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd