Preview

Computing and Ieee-754 Floating-point Standard

Satisfactory Essays
Open Document
Open Document
352 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computing and Ieee-754 Floating-point Standard
1. Name the three ways in which signed integers can be represented in digital computers and explain the differences. 2. Which one of the three integer representations is used most often by digital computer systems? 3. How are complement systems like the odometer on a bicycle? 4. Do you think that double-dabble is an easier method than the other binary-to-decimal conversion methods explained in this chapter? Why? 5. With reference to the previous question, what are the drawbacks of the other two conversion methods? 6. What is overflow and how can it be detected? How does overflow in unsigned numbers differ from overflow in signed numbers? 7. If a computer is capable only of manipulating and storing integers, what difficulties present themselves? How are these difficulties overcome? 8. What are the three component parts of a floating-point number? 9. What is a biased exponent, and what efficiencies can it provide? 10. What is normalization and why is it necessary? 11. Why is there always some degree of error in floating-point arithmetic when performed by a binary digital computer? 12. How many bits long is a double-precision number under the IEEE-754 floating-point standard? 13. What is EBCDIC, and how is it related to BCD? 14. What is ASCII and how did it originate? 15. How many bits does a Unicode character require? 16. Why was Unicode created? 17. Why is non-return-to-zero coding avoided as a method for writing data to a magnetic disk? 18. Why is Manchester coding not a good choice for writing data to a magnetic disk? 19. Explain how run-length-limited encoding works. 20. How do cyclic redundancy checks work? 21. What is systematic error detection? 22. What is a Hamming code? 23. What is meant by Hamming distance and why is it important? What is meant by minimum Hamming distance? 24. How is the number of redundant bits necessary for code related to the number of data bits?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Lab 1

    • 319 Words
    • 4 Pages

    4. The leading Zeros would make it difficult to build a decimal to binary conversion table in excel. Excel doesn’t see numbers with leading 0s as real numbers.…

    • 319 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. What is the highest number that can be stored in a byte? – 8 bytes as 11111111 or 255 in decimal.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following is not a feature of the file system that might be used with a hard disk drive?…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 746 Words
    • 3 Pages

    We are running programs on a machine where values of type int have a 32-…

    • 746 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this activity you will learn how to convert numbers between the decimal, binary, octal, and hexadecimal number systems.…

    • 412 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 1 Assignment

    • 1994 Words
    • 8 Pages

    For example, the capital letter A is ASCII character 65, the numeral 2 is ASCII 50, the character} is ASCII 125 and the metacharacter carriage return is ASCII 13. Systems based on ASCII use seven bits to represent these values digitally. In contrast, most computers store data in memory organized in eight-bit bytes. Files that contain machine-executable code and non-textual data typically contain all 256 possible eight-bit byte values. Many computer programs came to rely on this distinction between seven-bit text and eight-bit binary data, and would not function properly if non-ASCII characters appeared in data that was expected to include only ASCII text. For example, if the value of the eighth bit is not preserved, the program might interpret a byte value above 127 as a flag telling it to perform some function. It is often desirable, however, to be able to send non-textual data through text-based systems, such as when one might attach an image file to an e-mail message. To accomplish this, the data is encoded in some way, such that eight-bit data is encoded into seven-bit ASCII characters (generally using only alphanumeric and punctuation characters—the ASCII printable characters). Upon safe arrival at its destination, it is then…

    • 1994 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Number Conversions

    • 180 Words
    • 2 Pages

    2.Convert your binary result back into decimal to prove your answer is correct. This is also…

    • 180 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    What is data redundancy, and which characteristics of the file system can lead to it?…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    1. A striped volume writes to the physical disks evenly, rather than filling allotted space one and then moving to the next, and striped volumes do not provide fault tolerance.…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    c) There was no overflow condition because the numbers have opposite signs and overflow cannot occur.…

    • 1112 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    From the first look at the CourseMate recourses, user will find a number of very intelligent tools that can help him/her to read, practice, and even taking some quizzes to evaluate his/her level. Those recourses are available for each chapter and can be accessed easily with valid course key and CourseMate pin number.…

    • 695 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IP Subnetting

    • 333 Words
    • 2 Pages

    11. Given 4 bits of mask for the network portion, how many subnets are available?…

    • 333 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1110

    • 315 Words
    • 2 Pages

    Chapter two discusses the understanding of computer, math, and measurements. Also, it shows you how we use computer math with computer hardware and systems. Some of these concepts are bits versus bytes, binary versus decimal, Boolean operators, hertz, and data transfer. The chapter two also shows numbering systems used in computers. These are some importance skills that will help you in the computer field.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report?…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    What is the most important difference between a computer and a calculator? [RQ, no. 2]…

    • 1161 Words
    • 5 Pages
    Powerful Essays