Subtract, multiply rule and truncate the guard bits, Computer Engineering

Write the Add/subtract rule for floating point numbers.

Ans: a. Select the number with the smaller exponent and shift its mantissa right a number of steps equal to the difference in exponents.

b. Set the exponent of the result equal to the larger exponent.

c. Perform addition/subtraction on the mantissa and determine the sign of the result

d. Normalize the resulting value, if it is necessary.

Described multiply rule for floating point numbers.

Ans:a. First add the exponent and subtract 127.

b. then Multiply the mantissa and determine the sign of the result.

c. Normalize the resulting value, if it is necessary.

What are the ways to truncate the guard bits?

Ans: There are various ways to truncate the guard bits:

  •   Von Neumann rounding
  •   Chopping
  •   Rounding

 

Posted Date: 10/13/2012 8:14:40 AM | Location : United States







Related Discussions:- Subtract, multiply rule and truncate the guard bits, Assignment Help, Ask Question on Subtract, multiply rule and truncate the guard bits, Get Answer, Expert's Help, Subtract, multiply rule and truncate the guard bits Discussions

Write discussion on Subtract, multiply rule and truncate the guard bits
Your posts are moderated
Related Questions
A program in execution is called?  Ans. When a program in execution is known as Process.

No C don't have circular shift operator. (Part of the reason why that is the sizes of C's types aren't precisely described----but a circular shift makes most sense when applied to

Difference between Panel and Group Box classes? Panel & Group box both can used as container for other controls like radio buttons & check box. The dissimilarity in panel & gro

What are several issues for selecting best workarounds in multiple inheritances? Some restrictions methods are used. Use two approaches of delegations, which is an implementati

Q. Insert images in Dreamweaver? You will learn two methods to insert images in Dreamweaver-using Dreamweaver's main menu and using Objects panel. 1. Click anywhere in the l

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

What layers are covered under end to end layer connectivity? The layers 4 to 7 of ISO-OSI reference model communicate along with peer entities into the end systems. There is n

Memory - management mode System memory-management mode (SMM) is on the same level as protected mode, real mode and virtual mode though it is provided to function as a manager

SPMD is actually a "high level" programming model that can be built upon any combination of the previously mentioned parallel programming models. A single program is executed by al

Explain about the Acoustic tablet Acoustic (or sonic) tablet use sound waves to detect a stylus position. Either strip microphones or point microphones can be used to detect th