Compute a factorial that can fit within an unsigned 16 bit

Assignment Help Computer Engineering
Reference no: EM132107914

In this programming assignment, you will use your newfound looping knowledge to compute a factorial that can fit within an unsigned 16 bit integer.

You should use nested loops to try different factorials until you get to one that does not fit, then exit the loop and print a message defining which number became too large.

As you should recall, a factorial is computed like the following:

3! = 3 * 2 * 1

The pseudo code for one way to do this program is shown below. You can use a different method as long as you use nested loops in a way similar to that shown.

num = 10
overflow = false
while (1) {
int16 = 1
for (i = num; i > 0; i--) {
int16 = int16 * i
if (overflow detected) {
overflow = true
break // Break out of inner loop
}

}
if (overflow) {
print "Factorial overflowed 16 bits when number reached ", num
break // Break out of outer loop
}
num = num + 1
}

Reference no: EM132107914

Questions Cloud

What does the bond currently sell for : It has a YTM of 6% and the coupons are paid semiannually at a 11% annual rate. What does the bond currently sell for? (Show workings)
What is the bond full price : Assuming a 30/360 day-count convention, what is the bond's full (dirty) price? Round your answer to the nearest cent (2 decimal places).
What is the growth outlook : What is the Growth outlook and the Level of barriers to entry the Petroleum Industry?
Explain why german market is the better one : Management group believe German is better than England. List those two countries' advantage and disadvantage and explain why German market is the better one
Compute a factorial that can fit within an unsigned 16 bit : You will use your newfound looping knowledge to compute a factorial that can fit within an unsigned 16 bit integer.
What is the fair price of one afa bond to the nearest cent : Given the risk of AFA and its recent credit downgrade to CC, the required return on these bonds is now 17.5%.
Write a program that prints all numbers from 1 to n : Use the for statement in a program that prints all the numbers from n1 to n2, where n1 and n2 are two numbers specified by the user.
What is the current value of bank bills : If the current 180-day bill rate is 6.9% p.a., what is the current value of these bank bills to the nearest dollar?
Write a simulator in which one round of simulation involves : Write a simulator in which one round of simulation involves flipping a set of ten unfair coins in which there is a fixed likelihood.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd