Floating point representation in memory, Computer Networking

Floating Point Representation in Memory

1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?

2. a) Define a structure to store roll no, name and marks of a student.

b) Using the structure of Q2. a), above write a 'C' program to create a file "student.dat". There must be one record for every student in the file. Accept the data from the user.

c) Using the "student.dat" of Q2. b), above write a 'C' program to search for the details of the student whose name is entered by the user.

 3. How is communication between computers established in Internet. What characteristics need to be defined in a communication protocol? Explain the physical and logical paths in a computer communication network also.

Posted Date: 2/15/2013 5:19:00 AM | Location : United States

Related Discussions:- Floating point representation in memory, Assignment Help, Ask Question on Floating point representation in memory, Get Answer, Expert's Help, Floating point representation in memory Discussions

Write discussion on Floating point representation in memory
Your posts are moderated
Related Questions
The combinational circuits use the comparators for comparing the storing and number them on the basis of minimum and maximum functions. Likewise, in the interconnection networks th

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Data Types Each data type of Table 1 must be sent according to the specifications below. [INT] Each value of this type is sent as the string representation of the corre

Question The circuit in the figure is driven by a 9 mV amplitude signal generator with an output impedance of 2 kW. What is the output voltage amplitude from the circuit in the

Q. What is Bens Network? It's a non-blocking network. It's a special type of Clos network where first and last stage consists of  2×2 switches (for n input  and m output networ

Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

Parallel Programming Environment Characteristics  The parallel programming environment consists of an debugger, a editor,  performance evaluator and programme visualizer for i

State the Steps to provide more computing power In order to provide more computing power, the following steps may be taken: Add more processing power by addition of more

Advantages of VPNs Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration. a. Improved secur

IPv6 The  internet  engineering task force begin  the effort to develop a successor  protocols  to IPv4 in the early  1990 is an internet  layer protocols  for packet  switched