### Use the 2s complement

Assignment Help Basic Computer Science
##### Reference no: EM13892636

Problem 1  Convert the following decimal numbers into (a) 8-bit, (b) 16-bit, and (c) 32-bit binary numbers. For negative numbers, use the 2's complement. State "overflow" if a number cannot be represented correctly.

1)      45 ten.

2)      -81 ten.

3)      -3,000 ten.

Problem 2  What decimal number does each of the following two's complement binary number represent?

1)      1111 1111 1111 1111 1111 1111 1011 1101 two.

2)      1111 1111 1111 1111 1111 1111 1101 1001 two.

3)      0111 1111 1111 1111 1111 1111 1011 1111 two.

Problem 3  Show the IEEE 754 binary representation for the following floating-point numbers in single and double precision. Give your results in hexadecimal format.

1)      19 ten.

2)      2.375 ten.

3)      -0.3ten.

### Write a Review

#### Feasibility of creating an inexpensive digital forensics lab

Determine the feasibility of creating an inexpensive digital forensics lab. Conclude whether or not you believe a lab using inexpensive and/or free tools and homemade devices are suitable for corporate and / or law enforcement investigations.

#### The load master for a freighter

The load master for a freighter wants to determine the mix of cargo to be carried on the next trip. The ship's volume limit for cargo is 100,000 cubic meters, and it weight capacity is 2,310 tons.

#### Use mcnaughton''s wrap around rule

Use McNaughton's wrap around rule to construct a preemptive

#### Security threats and vulnerabilities of the itrust database

The length of this paper should be 5-7 pages double spaced not inclusive of the title or reference pages and include all completed Tables as appendices. Prepare your report in either Word or PDF format, as your instructor requires, and post it ..

#### Demonstrate effective communication

Demonstrate effective communication by composing writing that communicates ideas, meaning and/or argument in a format that broadly follows conventions in the information systems field.

#### Perform the arithmetic encoding and decoding

Perform the arithmetic encoding and decoding of the following message ABBCAB\$.

#### Write instructions to move value of register and add them

Write instructions to move value 34H into register A and value 3FH into register B, then add them together. Where is the result

#### Swing gui to translate test this is input in english

Design and code a SWING GUI to translate test this is input in English into Pig Latin.You can assume that the sentence contains no punctuation. The rules for Pig Latin are

#### Explain animation schemes comprise slide transitions

Some animation schemes comprise slide transitions and some don't. When would the transition be suitable? When would it not be suitable?

#### A media access protocol for wireless lan

The required readings for this homework are lectures 3 and 4 and the following papers: a) "MACAW: A Media Access Protocol for Wireless LAN's" ,b) 802.11 standard, which are available at the courseweb. You are encouraged to look formore sources onli..

#### Deploy a highly developed ou structure to implement securit

WWTC office at New York is largely autonomous and few IT personnel to take care of day-to-day IT support activities such as password resets troubleshoot virus problems.  You are concerned about sensitive data store in this location. You want to deplo..

#### Discuss the technology

Take a technology and place it on the hype cycle. First, describe a technology assuming I know nothing about the technology, include a URL, if necessary, to better discuss the technology. Second, tell me where on the hype cycle the technology f..