Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Floating Point Representation?
Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called mantissa and second part signifies decimal or binary point position and is called an Exponent. Mantissa can be an fraction or simply an integer. Please keep in mind that position of decimal or binary point is presumed and it's not a physical point thus wherever we are representing a point it's only assumed position.
A decimal + 12.34 in a distinctive floating point notation can be signified in any of subsequent two forms:
This number in any of above forms (if represented in BCD) needs 17 bits for mantissa (1 for sign and 4 every decimal digit as BCD) and 9 bits for exponent (1 for sign and 4 for every decimal digit as BCD). Please note the exponent denotes correct decimal location. In first case where exponent is +2 denotes that actual position of decimal point is two places to right of assumed position whereas exponent- 2 denotes that assumed position of point is two places in the direction of left of assumed position. The assumption of position of point is generally same in a computer resulting in a consistent computational environment.
Floating-point numbers are frequently represented in normalised forms. A floating point number whose mantissa doesn't comprise zero as most significant digit of number is considered to be in normalised form. For illustration a BCD mantissa + 370 that is 0 0011 0111 0000 is in normalised form since these leading zero's aren't part of a zero digit. On the other hand a binary number 0 01100 isn't in a normalised form. The normalised form of this number is:
Multiprogramming or multitasking? Ans: The OS manages the concurrent execution of many application programs to make best possible use of computer resources. This pattern of si
Q. Explain about Synchronous DRAM? One of the most broadly used forms of DRAM is synchronous DRAM (SDRAM). Unlike the conventional DRAM that is asynchronous SDRAM exchanges dat
What is Traffic Engineering? Traffic engineering gives the basis for analysis and design of telecommunication network to carry a specified traffic at an exact loss probability
Explain the term- Wireless Technologyand Broadband Wireless Technology (WiFi) and Broadband Most areas in the world now provide broadband instead of dial up for connectin
WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i wrongly gets the n
Q. Define Keyword and Identifiers? Keyword: A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of t
Search Methods and Heuristics - Artificial intelligence: Here now we come to the question of how constraint solvers search for solutions -constraint preserving coursework of v
What is Register Set Register Set: Register set is used to keep immediate data during the implementation of instruction. This area of processor having of various registers.
Example of Structural hazards - computer architecture: A machine has shared a single-memory pipeline for instructions and data. As a consequence, when an instruction which con
What are the drill-down features provided by ABAP/4 in interactive lists? ABAP/4 gives some interactive events on lists such as AT LINE-SELECTION (double click) or AT USER-COM
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd