1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
4 years ago
7

IEEE 754-2008 contains a half precision that is only 16 bits wide. Th e left most bit is still the sign bit, the exponent is 5 b

its wide and has a bias of 15, and the mantissa is 10 bits long. A hidden 1 is assumed. Write down the bit pattern to represent 1.5625 101 assuming a version of this format, which uses an excess-16 format to store the exponent. Comment on how the range and accuracy of this 16-bit fl oating point format compares to the single precision IEEE 754 standard.
Computers and Technology
1 answer:
ANEK [815]4 years ago
6 0

Answer:

The representation of -1.5625 * 10^-1 is 1 01100 0100000000

Explanation:

A bit to represent -1.5625 * 10^-1

Convert -1.5626 base 10 to base 2.

It gives -0.00101

First, we normalise the above number representation.

If 1 number is assumed to be hidden

This is given as;

-0.00101 base 2

= -1.01 * 2^-3 -- base 2

The sign, exponent and fraction are as follows;

The left most bit is still the sign bit, so we have;

Sign: 1 ---- Negative Number

The exponent is 5 bits wide and has a bias of 15, so we have

Exponent: 12 ----. (-3 = 12 - 15; 15 being bias)

The mantissa is 10 bits long.

Fraction; 1.01

So, the representation of -1.5625 * 10^-1 is as follows

1 01100 0100000000

Comment:

Since, exponent is much shorter; the range is also shorter than the single precision IEEE754 standard.

And also, the fraction is also shorter; so, the half precision standard is not accurate.

You might be interested in
¿porque y como surge la informatica y las computadoras
LekaFEV [45]

Answer: La informática es el futuro: un puente hacia todas las cosas útiles.

La informática aprovecha el poder y la posibilidad de la tecnología digital para transformar datos e información en conocimiento que la gente usa todos los días. Este fuerte enfoque en el uso humano de la informática ayuda a las personas a interactuar con la tecnología de la mejor y más eficiente manera posible.

Explanation:

8 0
3 years ago
Tyler is building a fish tank in the shape of a sphere that has a diameter of 18 inches. Based on Tyler's research, it is recomm
Wewaii [24]

Answer:

<em>Tyler should buy 4 fishes</em>

<em></em>

Explanation:

diameter d of Tyler's sphere tank = 18 inches

radius r of the tank = d/2 = 18/2 = 9 inches

Volume of water that will be contained within the sphere will be roughly equal to the volume of the sphere

Volume of a sphere = \frac{4}{3} \pi r^{3}

Volume of the sphere = \frac{4}{3}*3.142*9^{3} = 3054.024 cubic inches

since it is recommended to have no more than 1 goldfish for every 693 cubic inches of water,

number of goldfishes will be = 3054.024/693 = 4.41

since there can only be a whole number of goldfishes, then,

<em>Tyler should buy 4 fishes</em>

7 0
3 years ago
Identify which component of a radiology service accounts for the use of equipment and supplies and the employment of radiologic
satela [25.4K]
The answer is Technical.
In Radiology, there are three main components – Professional, Technical, and Global. Among these components, technical is described as the service of the radiologic technologist. It’s also described as the use of equipment, film, and other supplies.
5 0
3 years ago
Write the function appendEvens() which, given two arrays, adds all of the even elements from the first to the second. You may as
Ksivusya [100]

Answer:

function appendEvens( arr1, arr2) {

   for (let i in arr1){

       if (i%2 == 0){

           arr2.push(i);

       }

   }

}

Explanation:

The defined javascript function "appendEvens" is a function that returns undefined. It accepts two arrays and pushes the even numbers from the first array to the second.

6 0
3 years ago
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
Rasek [7]

Answer:

C: The protocols of the Internet were designed to scale as new devices were added.

Explanation:

The internet protocols are changed every year to adapt to the new devices that have been connected to the network. Back in the 1990s, most traffic used a few protocols.  Pv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

For many years, there were negligible changes to these core Internet protocols; HTTP added a few new headers and methods, TLS slowly went through minor revisions, TCP adapted congestion control, and DNS introduced features like DNSSEC. The protocols themselves looked about the same ‘on the wire’ for a very long time (excepting IPv6, which already gets its fair amount of attention in the network operator community.)

As a result, network operators, vendors, and policymakers that want to understand (and sometimes, control) the Internet have adopted a number of practices based upon these protocols’ wire ‘footprint’ — whether intended to debug issues, improve quality of service, or impose policy.

Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to those who have taken liberties with undocumented aspects of protocols or made an assumption that things won’t change.

3 0
4 years ago
Other questions:
  • A user is trying to delete a file located on an NTFS volume on his Windows 8 computer but is unable to do so. Why is this?
    11·1 answer
  • Suppose there is a class Roster. Roster has one variable, roster, which is a List of tuples containing the names of students and
    6·1 answer
  • Question 14 (3 points)
    5·1 answer
  • Which steps allow a user to change the column layout in the Handout Master?
    9·1 answer
  • Most operating systems perform all of the following tasks except _____. a. displaying the Graphical User Interface b. indexing t
    13·1 answer
  • Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
    9·1 answer
  • Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
    15·2 answers
  • If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
    8·1 answer
  • Name the wireless technology that may work with one device and not with another.
    13·1 answer
  • The objectivity of a site relates to its a. Appearance c. Graphics b. Biases d. Quotes from other Internet authors Please select
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!