Subtract, multiply rule and truncate the guard bits, Computer Engineering

Assignment Help:

Write the Add/subtract rule for floating point numbers.

Ans: a. Select the number with the smaller exponent and shift its mantissa right a number of steps equal to the difference in exponents.

b. Set the exponent of the result equal to the larger exponent.

c. Perform addition/subtraction on the mantissa and determine the sign of the result

d. Normalize the resulting value, if it is necessary.

Described multiply rule for floating point numbers.

Ans:a. First add the exponent and subtract 127.

b. then Multiply the mantissa and determine the sign of the result.

c. Normalize the resulting value, if it is necessary.

What are the ways to truncate the guard bits?

Ans: There are various ways to truncate the guard bits:

  •   Von Neumann rounding
  •   Chopping
  •   Rounding

 


Related Discussions:- Subtract, multiply rule and truncate the guard bits

Diffrentiate between non-relocatable & relocatable programs, How non-reloca...

How non-relocatable programs are different from relocatable programs? Non relocatable program: It is one that cannot be made to execute in any type of area of storage other t

Computer architecture, 6.How can we improve the performance of pipeline pro...

6.How can we improve the performance of pipeline processing

Java, differentiate between multitasking and multithreading in java

differentiate between multitasking and multithreading in java

Describe about address space and memory space, Q. Describe about Address Sp...

Q. Describe about Address Space and Memory Space? An address used by a programmer will be termed as a virtual address and set of such addresses the address space. An address in

History of e-commerce, In 1960: The purpose of e-commerce was to exchange t...

In 1960: The purpose of e-commerce was to exchange the electronic data. In 1970s: Electronic Fund Transfers or EFT was developed which considered as huge impact in the emerging

Show types under which networks will be divided, What are the two broad typ...

What are the two broad types under which Networks will be divided? Ans: All computer networks fit in one of the two dimensions specifically: a)  Transmission Technology, thi

Example of asymptotic notations, Q. Example of asymptotic notations? Th...

Q. Example of asymptotic notations? The function f (n) belongs to the set  (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0

Database management system, what is time out based schemes in concurrency c...

what is time out based schemes in concurrency control

Explain a binary semaphore, Explain a binary semaphore with the help of an ...

Explain a binary semaphore with the help of an example? An abstract data type (ADT) is a semaphore which defines a nonnegative integer variable that apart from initialization i

Nix commands, reate a directory "Unix" under your home directory. Command(...

reate a directory "Unix" under your home directory. Command(s): ………………………………………….

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd