Floating point numbers can introduce rounding errors in

Assignment Help Computer Engineering
Reference no: EM13463817

The storage and representation of numbers in a computer can lead to costly mistakes because of precision errors. When using floating point numbers, one must make sure that the correct number of digits is used in a calculation because rounding errors can produce values that lead to errors. Consider the floating point format, exponential format, and binary coded decimal (BCD). 

Write a four to five page paper in which you:

  1. Analyze the floating point format in order to:
    • Determine how floating point numbers are stored in memory.
    • Discuss the ease or difficulty of manipulating and using floating point numbers in arithmetic calculations.
  2. Determine whether or not you believe that the floating point format is memory efficient. Provide a rationale to support your answer.
  3. Analyze the format used to store numbers using the binary coded decimal format. Determine whether the BCD format is more or less memory efficient than the floating point format.
  4. Compare and contrast the BCD format to the floating point format in terms of:
    • precision
    • performance in calculations
    • memory usage
  5. Select the format (floating point format, binary coded decimal (BCD), or exponential format) that you would recommend for processing efficiency and explain why.
  6. Floating point numbers can introduce rounding errors in the banking industry, which may lead to financial benefit for the bank but not for the customer. Analyze the ethics of knowingly benefitting from rounding errors. Propose a plan on how the rounding error should be handled.
  7. Differentiate between the exponential format and the floating point format in terms of:
    • format
    • processing speed
    • accuracy
  8. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13463817

Questions Cloud

Explain the mock counseling session how effective were you : explain your mock counseling session. how effective were you at helping your client to discover the irrational beliefs
Share an example of condition in which abuse of power : the conflict climate is the psychological atmosphere the individuals perceive. this climate can be harmful or
Computer crime has become a serious matter for your : compare and contrast the mis in place in two distinctly different organizations.nbspcompare each organizations usenbsp
Label each file name according to the section of the : this assignment consists of two 2 sections a design document and a revised gantt chart or project plan. you must submit
Floating point numbers can introduce rounding errors in : the storage and representation of numbers in a computer can lead to costly mistakes because of precision errors. when
Describe how you can build quality into your project in : 1.describe how you can build quality into your project in each of the pmbokreg process groups.2. does one process group
For research question indicate the following the kind of : for the research question indicate the following 1 the type of reseach that wouldbest answer the question 2 an
What is included in the establishment of a functional : part 1 using the internet search for commercial idps systems. what classification systems and descriptions are used and
The functional role of network monitoring by different : the functional role of network monitoring by various areas in this week. you are also familiar with the pieces of

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implement a class address

Implement a class Address. An address has a house number, a street, an optional apartment number, a city, a state, and a postal code. Supply two constructors: one with an apartment number and one without.

  Explaining the trust/security domain boundaries

Recognize and explain Trust/Security Domain boundaries which may be applicable to the personal computer (workstation) security in the business context.

  How security and integrity of their data can be maintained

The advantages and disadvantages to an organisation of using Cloud Computing, for example, the potential to reducecosts, the risk of making the organisation's data more vulnerable to hacking.

  Would this proposed solution meet the requirements

Your company has just occupied an old historic building in which 15 employees will work. because of historic building codes, the company is not permitted to run cables inside walls or ceilings.

  Explain change management procedure by data flow diagram

Using the data flow diagram explain the change management procedure, which might be used in the large organization concerned with developing software for external clients.

  Describing rules for developing websites

All the Web pages in the Web site consist of the word “Museum”. Write down a formula describing these rules. It must be a series of logical conditions which is equivalent to the rules.

  Determine appropriate trend equations for each set of data

Measurements of the compressive strength of concrete after 1 day and 28 days of curing have been taken for a range of curing temperatures.  Determine appropriate trend equations for each set of data (the 1-day and 28-day curing) as a function of t..

  Program to carrying out the arithmetic calculations

Write down a program which will help an elementary school student learn about the addition, division, subtraction, multiplication. Utilize the and function in order to generate two positive one-digit integers.

  How to provide the name of the web site

For this project you will need to make a Microsoft Word document which includes a table and hyperlinks to Web sites helpful to someone studying in your major Paralegal.

  Rewrite the fragment to obtain an equivalent code fragment

What is the output when the following code fragment is executed? Rewrite the fragment to obtain an equivalent code fragment in which the body of the loop is a simple statement instead of a compound statement.

  How to support the high bandwidth applications and growth

You have been contracted to create a network for a multimedia development firm that currently uses a 10-Mbps Ethernet network. The company requires a high-bandwidth network for the multimedia team, that constantly views and manipulates large files ..

  Design a class named productionworker

The workday is divided into two shifts: day and night. The shift field will hold an integer value representing the shift that the employee works. The day shift is shift 1 and the night shift is shift 2. make the appropriate accessor and mutator met..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd