Subtract, multiply rule and truncate the guard bits, Computer Engineering

Assignment Help:

Write the Add/subtract rule for floating point numbers.

Ans: a. Select the number with the smaller exponent and shift its mantissa right a number of steps equal to the difference in exponents.

b. Set the exponent of the result equal to the larger exponent.

c. Perform addition/subtraction on the mantissa and determine the sign of the result

d. Normalize the resulting value, if it is necessary.

Described multiply rule for floating point numbers.

Ans:a. First add the exponent and subtract 127.

b. then Multiply the mantissa and determine the sign of the result.

c. Normalize the resulting value, if it is necessary.

What are the ways to truncate the guard bits?

Ans: There are various ways to truncate the guard bits:

  •   Von Neumann rounding
  •   Chopping
  •   Rounding

 


Related Discussions:- Subtract, multiply rule and truncate the guard bits

What is basic time division switching, What is Basic Time Division Switch...

What is Basic Time Division Switching? Basic Time Division Switching: The functional blocks of a memory based time division switching switch is demonstrated in figure and i

What is the impact of overflow for binary numbers, Q. What is the impact of...

Q. What is the impact of overflow for binary numbers? An overflow is said to have happened when sum of two n digits number takes n+ 1 digits. This definition is perfectly appli

Network, Give an intuitive explanation of why the maximum throughput, for s...

Give an intuitive explanation of why the maximum throughput, for small beta, is approximately the same for CSMA slotted Aloha and FCFS splitting with CSMA. Show the optimal expecte

How a physical addressing is performed in wan, How physical addressing is p...

How physical addressing is performed in WAN? WAN networks operate as similar to a LAN. All WAN technology classifies the exact frame format a computer uses while sending and re

Utilization count - processor, The Utilization Count shows the status of ea...

The Utilization Count shows the status of each processor in a specific mode i.e.  Overhead mode, busy mode, and idle mode with respect to the progress in time as shown in Figure.

Hrm, hrm digrams

hrm digrams

Uml, what is uml ?

what is uml ?

Describe the von neumann architecture, Describe the VON NEUMANN ARCHITECTUR...

Describe the VON NEUMANN ARCHITECTURE Most  of  present  computer  designs  are  based  on  idea  developed  by  John  vonNeumann referred to as the VON NEUMANN ARCHITECTURE. V

Give an example of first fit and best fit algorithms, Given memory partiti...

Given memory partitions of 100k, 500k, 200k, 300k, and 600k (in order), apply first fit and best fit algorithms to place processes with the space requirement of 212k, 417k, 112k an

What is the concept of lock, Q. What is the Concept of Lock? Locks are ...

Q. What is the Concept of Lock? Locks are used for protected access of data in a shared variable system.  There are numerous kinds of locks:  1)  Binary Locks: These locks a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd