Explain about floating point representation, Computer Engineering

Assignment Help:

Q. Explain about Floating Point Representation?

Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called mantissa and second part signifies decimal or binary point position and is called an Exponent. Mantissa can be an fraction or simply an integer. Please keep in mind that position of decimal or binary point is presumed and it's not a physical point thus wherever we are representing a point it's only assumed position. 

A decimal + 12.34 in a distinctive floating point notation can be signified in any of subsequent two forms:

This number in any of above forms (if represented in BCD) needs 17 bits for mantissa (1 for sign and 4 every decimal digit as BCD) and 9 bits for exponent (1 for sign and 4 for every decimal digit as BCD). Please note the exponent denotes correct decimal location. In first case where exponent is +2 denotes that actual position of decimal point is two places to right of assumed position whereas exponent- 2 denotes that assumed position of point is two places in the direction of left of assumed position. The assumption of position of point is generally same in a computer resulting in a consistent computational environment. 

Floating-point numbers are frequently represented in normalised forms. A floating point number whose mantissa doesn't comprise zero as most significant digit of number is considered to be in normalised form. For illustration a BCD mantissa + 370 that is 0 0011 0111 0000 is in normalised form since these leading zero's aren't part of a zero digit. On the other hand a binary number 0 01100 isn't in a normalised form. The normalised form of this number is:

2347_Explain about Floating Point Representation.png


Related Discussions:- Explain about floating point representation

State about the computer memories, Computer Memories Computer memories...

Computer Memories Computer memories are either external or internal. Internal memories are either RAM (random access memory) or ROM (read only memory). External memories can t

What is function overloading, a. Describe function declaration, function de...

a. Describe function declaration, function definition and function cell using a suitable example. Explain the function prototype? b. What is function overloading? When do we use

The javascript validation not run on the asp.net, Why The JavaScript Valida...

Why The JavaScript Validation Not Run on the Asp.Net? The Asp.Net Button Is post backed on the server & not yet Submit & when it goes to the server its states is lost so if we

Interconnection network in-array processing, Interconnection Network (IN): ...

Interconnection Network (IN):  IN performs data exchange between the PEs, manipulation functions and data routing. This IN is under the control of CU.

What is the functionality of remote login, What is the functionality of Rem...

What is the functionality of Remote Login? Remote Login gives similar functionality of telnet, along with the added functionality of not involving a password from trusted cli

Telecommunications, with poisson arrival of two calls per minute what is th...

with poisson arrival of two calls per minute what is the probability that more than three calls will arrive in two minutes? that is the time during which at least 4 calls will arr

Differentiate among validation and exception testing, Differentiate between...

Differentiate between validation and exception testing. - Validation testing is done to test software in conformance to requirements specified. It aims to demonstrate that soft

Web service as opposed to a non-serviced, Can you give an example of when i...

Can you give an example of when it would be appropriate to use a web service as opposed to a non-serviced .NET component? A web service has the following characteristics:  1

Explain resource request and allocation graph (rrag), Explain Resource requ...

Explain Resource request and allocation graph (RRAG) Deadlocks can be explained by a directed bipartite graph known as a Resource-Request-Allocation graph (RRAG).A graph G = (V

Design a alarm system - microprocessor system, A burglar alarm system is co...

A burglar alarm system is controlled by a microprocessor system. The system has three independent circuit each consisting of 7 passive infra red sensors. The controller can be prog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd