Write the binary representation of an integer number, Computer Engineering

Assignment Help:

The integer n = 3,510,593 has hexadecimal representation 0x00359141 (check this with your d2h program), while the double precision, floating-point number 3510593.0 has hexadecimal representation 0x414ac8a080000000.  Derive this floating-point representation and explain the correlation between the bits of the integer and floating-point representations.

Here is a recommended procedure:

1.      Write the binary representation of n.  (Do you want to start from decimal 3510593 or hexadecimal 359141?)

2.      Insert a decimal (binary) point, and write n as 1.xxx ... x ´ 2E

3.      Write (E + BIAS) in binary.  (What is BIAS for a double?)

4.      Assemble the floating point representation of  (double)n  from the data you have collected.  How long is the longest run of matching bits in your answers to steps 1 and 4?

             Longest match is _______ bits.

More information about floating-point formats can be found in Section 2.4.2 of the text and the handout binfloat.pdf in the Piazza "General Resources" section.


Related Discussions:- Write the binary representation of an integer number

What are rimm, What are RIMM? RDRAM chips can be assembled into larger ...

What are RIMM? RDRAM chips can be assembled into larger modules known as RIMM. It can hold up to 16 RDRAM

Eme, state function and path function

state function and path function

How does output caching work in asp.net, How does output caching work in AS...

How does output caching work in ASP.NET?    Output caching is a powerful method that enhances request/response throughput by caching the content generated from dynamic pages. O

Send a report to the printer, How to send a report to the printer instead o...

How to send a report to the printer instead of displaying it on the screen? We can send a report to the printer instead of displaying it on the screen.  To do this, use the key

Explain about RISC architecture, Q. Explain about RISC ARCHITECTURE? Le...

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

What is the use of hypertext links in internet access, What is the use of h...

What is the use of hypertext links in Internet access? Use of Hypertext links in Internet access: From the user’s view point, the Web comprised a vast, worldwide collecti

What is the analysis techniques object modelling, What is the Analysis Tech...

What is the Analysis Techniques Object Modelling Object modelling is very significant for any object oriented development, object modelling shows static data structure of real

How to creating a key pair, How to Creating a Key Pair You can make a...

How to Creating a Key Pair You can make a key pair using the Strong Name tool (Sn.exe). Key pair files usually have an .snk extension. To create a key pair at the command

How do you add a developer to a trusted publishers list, Whenever a develop...

Whenever a developer is signing into the code project you will have three options they are disable the macro, enable the macro and explicitly trusting the publisher. You can trust

Describe the basic aspects of ENIAC, Q. Describe the basic aspects of ENIAC...

Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd