Illustrate decimal fixed point representation, Computer Engineering

Assignment Help:

Q. Illustrate Decimal Fixed Point Representation?

The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is signified as a combination of four bits so a four digit decimal number will need 16 bits for decimal digits representation and extra 1 bit for sign. Generally to keep convention of one decimal digit to 4 bits the sign sometimes is assigned a 4-bit code too. This code can be bit combination that hasn't been used to signify decimal digit for example 1100 can represent plus whereas 1101 can represent minus. 

For illustration a simple decimal number - 2156 can be signified as:

2362_Illustrate Decimal Fixed Point Representation.png

Though this technique wastes substantial amount of storage space however it doesn't need conversion of a decimal number to binary. So it can be used at places where amount of computer arithmetic is less than of the amount of input/output of data for example calculators or business data processing situations. The arithmetic in decimal can be performed as in binary too except that in place of signed complement signed nine's complement is used and in place of signed 2's complement signed 9's complement is used.


Related Discussions:- Illustrate decimal fixed point representation

Discussion., Functionality first and then Security?

Functionality first and then Security?

What is strong-typing versus weak-typing, What is strong-typing versus weak...

What is strong-typing versus weak-typing? Which is preferred? Why? Strong type is checking the types of variables as early as possible, usually at compile time. Whereas weak ty

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Explain the techniques used for protection of user files, Explain the techn...

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

The functions islower() and tolower(), Distinguish among the functions islo...

Distinguish among the functions islower() and tolower().   islower( ) and tolower( ): islower(c) is a character testing function described  in ctype.h header file. This

arithmetic pipelines, Arithmetic Pipelines The method of pipelining ca...

Arithmetic Pipelines The method of pipelining can be applied to a variety of complex and slow arithmetic operations to speed up the processing time. The pipelines used for arit

Hill climbing - artificial intelligence, Hill Climbing - Artificial Intelli...

Hill Climbing - Artificial Intelligence: As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, t

Methods for organising the associative memory, There are two methods for or...

There are two methods for organising the associative memory based on bit slices: Bit parallel organisation: In this organisation every bit slices which are not masked off,

Vector processing with pipelining-vector processing, Vector Processing with...

Vector Processing with Pipelining: Since in vector processing, vector instructions perform the similar computation on dissimilar data operands repeatedly, vector processing is most

Associative mapping - computer architecture, Associative Mapping: It i...

Associative Mapping: It is a more flexible mapping technique A primary memory block can be placed into any specific cache block position. Space in the cache may be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd