Subtract, multiply rule and truncate the guard bits, Computer Engineering

Assignment Help:

Write the Add/subtract rule for floating point numbers.

Ans: a. Select the number with the smaller exponent and shift its mantissa right a number of steps equal to the difference in exponents.

b. Set the exponent of the result equal to the larger exponent.

c. Perform addition/subtraction on the mantissa and determine the sign of the result

d. Normalize the resulting value, if it is necessary.

Described multiply rule for floating point numbers.

Ans:a. First add the exponent and subtract 127.

b. then Multiply the mantissa and determine the sign of the result.

c. Normalize the resulting value, if it is necessary.

What are the ways to truncate the guard bits?

Ans: There are various ways to truncate the guard bits:

  •   Von Neumann rounding
  •   Chopping
  •   Rounding

 


Related Discussions:- Subtract, multiply rule and truncate the guard bits

What are the logic micro-operations, Q. What are the Logic Micro-operations...

Q. What are the Logic Micro-operations? Logic operations are fundamentally binary operations that are performed on string of bits stored in the registers. For a logic micro-ope

Processor, what is the difference between i5 and i7 processor?

what is the difference between i5 and i7 processor?

What is npblox framework, Designed, developed, tested and documented the de...

Designed, developed, tested and documented the demo created for NPBlox framework. NPBlox framework is a framework which enabled developers to create CLI/WEB/SNMP interfaces for

What problem does the namespace feature solve, Multiple providers of librar...

Multiple providers of libraries may use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature

Truth tables, Any function can be expressed in a truth table.A truth table ...

Any function can be expressed in a truth table.A truth table lists all possible combinations ofinputs and gives the output produced in eachcase.Truth tables must include all combin

What is meaning of term byte stuffing, The term byte stuffing refers to: ...

The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.

What is immediate addressing, What is Immediate addressing The  data  i...

What is Immediate addressing The  data  itself,  beside  the address,  is  given  as  the  operand or operands  of  the instruction.

IT PMP project managemnet., Identify at least eight milestones for this pro...

Identify at least eight milestones for this project. Write a one-page paper describing each milestone using the SMART criteria?

Authentication system differ from a firewall in functioning, How does an au...

How does an authentication system differ from a firewall in functioning?   Authentication vs. firewall User Authentication and Authorization A significant advanced fi

Determine about the authoring software, Determine about the Authoring Softw...

Determine about the Authoring Software Also termed as author ware; this is a program which helps in the writing of hypertext or multimedia applications. Authoring tools general

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd