Write the binary representation of an integer number, Computer Engineering

Assignment Help:

The integer n = 3,510,593 has hexadecimal representation 0x00359141 (check this with your d2h program), while the double precision, floating-point number 3510593.0 has hexadecimal representation 0x414ac8a080000000.  Derive this floating-point representation and explain the correlation between the bits of the integer and floating-point representations.

Here is a recommended procedure:

1.      Write the binary representation of n.  (Do you want to start from decimal 3510593 or hexadecimal 359141?)

2.      Insert a decimal (binary) point, and write n as 1.xxx ... x ´ 2E

3.      Write (E + BIAS) in binary.  (What is BIAS for a double?)

4.      Assemble the floating point representation of  (double)n  from the data you have collected.  How long is the longest run of matching bits in your answers to steps 1 and 4?

             Longest match is _______ bits.

More information about floating-point formats can be found in Section 2.4.2 of the text and the handout binfloat.pdf in the Piazza "General Resources" section.


Related Discussions:- Write the binary representation of an integer number

Explain about bus of register transfer, Explain about Bus of register trans...

Explain about Bus of register transfer Since a computer has   several registers, paths must be provided to transfer information among registors. If separate lines are used amon

In how many ways the data can be passed to functions, Object Oriented Progr...

Object Oriented Programming 1. Describe that in how many ways the Data can be passed to functions? Explain with the help of one example. 2. Describe how you create class a

What are the principal shortcomings of mpi, (a) What are the principal sho...

(a) What are the principal shortcomings of MPI with respect to the deployment between companies and institutions? (b) Propose a possible solution for the parallel computing in

Illustrate working of rubber dome keyboards, Q. Illustrate working of rubbe...

Q. Illustrate working of rubber dome keyboards? Rubber Dome: In rubber dome keyboards both positioning and contact are controlled by a puckered sheet of elastomer that is a s

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

What technology used by magento, Magento uses PHP as a web server scripting...

Magento uses PHP as a web server scripting language and the MySQL Database. The data model is based on the Entity-attribute-value model that stores data objects in tree structures,

Tools for performance measurement, Tools for Performance Measurement Th...

Tools for Performance Measurement The reason behind these algorithms has been to gain a speed up and improve the performance. After the parallel algorithm has been written and

Determine the firewall in intranet technology, Determine the firewall in In...

Determine the firewall in Intranet technology Firewall remains the basic foundation of Internet and Intranet security, for many users getting into the corporate Intranet would

Explain bit slice ALUs, Bit Slice ALUs It was possible to manufacture ...

Bit Slice ALUs It was possible to manufacture smaller like 4 or 8 bits fixed point ALUs on a single IC chip. If these chips are constructed as expendable types then employing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd