Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Decimal Fixed Point Representation?
The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is signified as a combination of four bits so a four digit decimal number will need 16 bits for decimal digits representation and extra 1 bit for sign. Generally to keep convention of one decimal digit to 4 bits the sign sometimes is assigned a 4-bit code too. This code can be bit combination that hasn't been used to signify decimal digit for example 1100 can represent plus whereas 1101 can represent minus.
For illustration a simple decimal number - 2156 can be signified as:
Though this technique wastes substantial amount of storage space however it doesn't need conversion of a decimal number to binary. So it can be used at places where amount of computer arithmetic is less than of the amount of input/output of data for example calculators or business data processing situations. The arithmetic in decimal can be performed as in binary too except that in place of signed complement signed nine's complement is used and in place of signed 2's complement signed 9's complement is used.
Functionality first and then Security?
What is strong-typing versus weak-typing? Which is preferred? Why? Strong type is checking the types of variables as early as possible, usually at compile time. Whereas weak ty
State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u
Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne
Distinguish among the functions islower() and tolower(). islower( ) and tolower( ): islower(c) is a character testing function described in ctype.h header file. This
Arithmetic Pipelines The method of pipelining can be applied to a variety of complex and slow arithmetic operations to speed up the processing time. The pipelines used for arit
Hill Climbing - Artificial Intelligence: As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, t
There are two methods for organising the associative memory based on bit slices: Bit parallel organisation: In this organisation every bit slices which are not masked off,
Vector Processing with Pipelining: Since in vector processing, vector instructions perform the similar computation on dissimilar data operands repeatedly, vector processing is most
Associative Mapping: It is a more flexible mapping technique A primary memory block can be placed into any specific cache block position. Space in the cache may be
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd