Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Decimal Fixed Point Representation?
The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is signified as a combination of four bits so a four digit decimal number will need 16 bits for decimal digits representation and extra 1 bit for sign. Generally to keep convention of one decimal digit to 4 bits the sign sometimes is assigned a 4-bit code too. This code can be bit combination that hasn't been used to signify decimal digit for example 1100 can represent plus whereas 1101 can represent minus.
For illustration a simple decimal number - 2156 can be signified as:
Though this technique wastes substantial amount of storage space however it doesn't need conversion of a decimal number to binary. So it can be used at places where amount of computer arithmetic is less than of the amount of input/output of data for example calculators or business data processing situations. The arithmetic in decimal can be performed as in binary too except that in place of signed complement signed nine's complement is used and in place of signed 2's complement signed 9's complement is used.
Discuss the advantages of store program control (SPC) automation in telephone switching. Advantages of SPC: (i) Simple to control (ii) Simple to maintain (iii) Fine-
Opening Files for Reading Only : A data file is a file that you can open and read its contents visually - for example, C source files, .dat files, HTML etc - anything that look
It's not trivial to execute nested functions such that they have the proper access to local variables in the having function(s), so they were deliberately left out of C as a simpli
Pipelined Processor Having discussed pipelining; now we can describe a pipeline processor. A pipeline processor can be distinct as a processor that consists of a series of proc
What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro
In a 10000 line exchange, 0000 to 2999 is allotted to x group of subscribers, out of which 40% are active during busy hour. The remaining numbers are domestic numbers out of which
Q. Describe about full adder? Let's take full adder. For this other variable carry from previous bit addition is added let'us call it 'p'. Truth table and K-Map for this is dis
Define peripheral. Devices that are under the direct control of computer are said to be linked online. These devices are intended to read information into or out of the memory
composition of two shm in right angles to each other to havingg time period in the ratio 1:2
The linkage section is part of a known as program that 'links' or maps to data items in the calling program are working storage. It is the part of the called program where these sh
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd