Big – endian and little- endian representations, Computer Engineering

Explain Big - Endian and Little- Endian representations

Ans: The Big- endian is used where lower byte addresses are used for the more significant bytes (leftmost bytes) of the word.

The little-endian is used in opposite task, when the lower byte addresses are used for the less significant bytes (rightmost bytes) of the word.

 

 

Posted Date: 10/13/2012 8:01:49 AM | Location : United States







Related Discussions:- Big – endian and little- endian representations, Assignment Help, Ask Question on Big – endian and little- endian representations, Get Answer, Expert's Help, Big – endian and little- endian representations Discussions

Write discussion on Big – endian and little- endian representations
Your posts are moderated
Related Questions
What is guard bits? Guard bits are extra bits which are produced while the intermediate steps to yield maximum accuracy in the final results.

Explain about the term business-to-customer. B2C (business-to-customer): "Electronic commerce" is usually understood mostly as selling goods or services to people ("last

Condition codes are the list of possible conditions that can be tested through conditional instructions. Typical conditional instructions have: conditional branches, conditional ju

ALE-> Address latch enable...In the case of microcontroller (8051)& microprocessor 8085 the data line and low order 8 bit address lines are multiplexed. In order to getting address

What criteria should be adopted for choosing type of file organization. Selecting a file organization is a design decision; therefore it must be done having in mind the achieve

State about AGP The latest addition to many computer systems is the inclusion of accelerated graphics port (AGP). AGP operates at the bus clock frequency of the microprocessor.

Dear sir, I want to read Excel file and display it in grid view(the headings in excel file should be grid view column heading).This should be coded in C# Windows forms Application

Which Technologies of this age had tended to the emergence of computer network? Ans: The technologies are Communication technology and Computer technology with the support of V

Firewalls operate by Creening packets to/from the Network and give controllable filtering of network traffic.

Write down the general model for the translation process. For the translation process the general model can be represented as given here: