Signed 1’s complement representation, Computer Engineering

Assignment Help:

Q. Signed 1s complement representation?

Another possibility that is also simple is use of signed 1's complement. Signed 1's complement has a principal. Add both numbers including sign bit. If carry of most significant bit or sign bit is one then increment result by 1 and discard carry over. Let's repeat all operations with 1's complement.

Another interesting characteristic about these representations is representation of 0. In 1's complement and signed magnitude there are two representations for zero as:

Representation                                            + 0                                            -0  

Signed magnitude                         0       000 0000   1                             000 0000  

Signed 1's complement                0       000 0000   1                             111 1111 

However in signed 2's complement there is only one zero and there is no negative or positive zero.

2089_Signed 1s complement representation.png

So -0 in 2's complement notation is similar like +0 and is equivalent to 0 000 0000. So both +0 and -0 are similar in 2's complement notation. This is an extra benefit in favour of 2's complement notation.

Highest number which can be accommodated in a register also relies on type of representation. In general in an 8 bit register 1 bit is used as sign so rest 7 bits can be used for representing value. The highest and lowest numbers which can be represented are:

For signed magnitude representation   (27 - 1) to - (27 - 1)  

  = (128-1) to   - (128- 1)  

  = 127 to -127  

For signed 1's complement     127 to -127

Although for signed 2's complement we may represent +127 to -128. The - 128 is signified in signed 2's complement notation as 10000000.


Related Discussions:- Signed 1’s complement representation

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Define the public and extrn directives- assembler directives, Define the PU...

Define the PUBLIC and EXTRN directives- Assembler directives PUBLIC and EXTRN directives are very significant to modular programming. PUBLIC used to declare that labels of data

Explain approaches to identify free memory area in a heap, Discuss two main...

Discuss two main approaches to identify free memory area in a heap. Two popular systems to identify free memory areas as a result of allocation and de-allocations in a heap are

Trusted publisher, State the criteria which a trusted publisher should meet...

State the criteria which a trusted publisher should meet before adding him? Ans) The following criteria should be met by the publisher before adding him to the list. ? The

Define the working of flip flops, Define the working of Flip Flops? Fli...

Define the working of Flip Flops? Flip flop is the basic unit of storage this is used to store one bit of information. Flip-flops are the synchronous bistable devices. The term

Resource dependence , Resource Dependence The parallelism among the ...

Resource Dependence The parallelism among the instructions may also be affected because of  the shared resources. If two instructions are using the related shared resource t

I2c protocol bus , I²C TECHNOLOGIES The I2C protocol bus is two bi-dire...

I²C TECHNOLOGIES The I2C protocol bus is two bi-directional wires, serial data (SDA) and serial clock (SCL), that transmit information between the devices connected to the bus.

Utilization summary, Utilization Summary The Utilization Summary shows ...

Utilization Summary The Utilization Summary shows the status of each processor i.e. how much time (in the form of percentage) have been spent by every processor in busy mode, o

Explain implementation techniques, Explain Implementation techniques Im...

Explain Implementation techniques Implementation techniques(e.g. remote invocation, HTTP). An event-based cooperation can be executed using message passing or it can  be based

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd