Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Binary number system is most common for computer due to two stable states of its components. However unfortunately this isn't a very natural system for us as we deal with decimal number system. So how does computer carry out the arithmetic? One answer that is followed in most computers is to convert all input values into binary system. Then computer carries out arithmetic operations and ultimately converts results back to decimal number thus we can read it easily. Is there any substitute to this technique? Yes, there is an alternative method of performing computation in decimal form however it needs the decimal numbers must be coded correctly before carrying out these computations. Generally decimal digits are coded in 7-8 bits like alphanumeric characters however for purpose of arithmetic calculations the decimal digits are treated as 4 bit binary code. As we already know 2 binary bits can signify 22 = 4 different combinations, 3 bits can signify 23 = 8 combinations and in the same way 4 bits can signify 24 = 16 combinations. To signify decimal digits in binary form we need 10 combinations however we need to have a 4-digit code. One such general representation may be to use first 10 binary combinations to signify ten decimal digits. These are generally called Binary Coded Decimals (BCD). Figure below shows binary coded decimal numbers.
Figure: Binary Coded Decimals (BCD)
A certain car has suspension modes which are uncoupled front to back. When a person with a mass of 60 kg sits in the rear of a car, in the centre of the seat which is directly ove
Features of MPI-1 Binding for FORTRAN and C Collective communication Communication domains and Process groups Point-to-point communication Virtual process
Define the term busy hour Busy Hour: Continuous 1- hour period lying completely in the time interval concerned, for that the traffic volume or the number of calls attempts is
what are the Database designs to avoid?
Explain the Fundamentals of C Programming? The C is a general purpose structured programming language. The C was developed and first implemented by the Dennis Ritchie at Bell L
You have been asked to become the consulting technician for MobTex, a local auto servicing centre. The general manager (Jo) realises that the IT system has evolved over time with l
We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi
Q. Show Two Way Pipelined Timing? Figure below demonstrates a simple pipelining scheme in which F and E stages of two different instructions are performed concurrently. This sc
State the term- Interviewing This involves a one to one question & answer session between analyst and customer/employee. A good method if analyst wants to probe deeply into on
What are the various functional verification methodologies Ans: TLM (Transaction Level Modelling) Linting RTL Simulation (Environment involving : stimulus generators,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd