Floating point representation in memory, Computer Networking

Floating Point Representation in Memory

1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?

2. a) Define a structure to store roll no, name and marks of a student.

b) Using the structure of Q2. a), above write a 'C' program to create a file "student.dat". There must be one record for every student in the file. Accept the data from the user.

c) Using the "student.dat" of Q2. b), above write a 'C' program to search for the details of the student whose name is entered by the user.

 3. How is communication between computers established in Internet. What characteristics need to be defined in a communication protocol? Explain the physical and logical paths in a computer communication network also.

Posted Date: 2/15/2013 5:19:00 AM | Location : United States







Related Discussions:- Floating point representation in memory, Assignment Help, Ask Question on Floating point representation in memory, Get Answer, Expert's Help, Floating point representation in memory Discussions

Write discussion on Floating point representation in memory
Your posts are moderated
Related Questions
Question 1 Write short notes on Reserved IP addresses and Special use IP addresses 2 Explain about the packet switching mechanism based on Virtual Circuit 3 Explain about

Question: a) Show the shortest form of the following IPv6 address: 2340:0000:0000:000F:7000:119A:A001:0000 b) The IPv6 header includes a Class field and a Flow ID field. Bri

What are the most typical functional units of the Client/Server applications? Ans) typical functional units of the Client/Server applications User interface Business Logic

What is the major issue with hop count metric issue

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena

The major problems with multiple networks are as given: A computer attached to a given server can only interact with other computers attached to the similar network.

For VOIP, first you need to consider the codec to use. Although there are many voice codecs, MyCo wants the safest bet and suggests that you design with the most known and oldest c

features

What is Remote Procedure Call (RPC)? RPC hides the intricacies of the network by using the ordinary process call mechanism familiar to every programmer. A client process calls

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to