1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
4 years ago
13

The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD

D4((1101)2,(1100)2) = (1001)2 because (1101)2 + (1100)2 = (11001)2 but the leading bit can’t fit in the 4-bit register. A standard way for computers to represent negative integers is the "two’s complement" method TN (x). Non-negative integers from 0 to 2N−1 − 1 are represented using ordinary fixed-width binary (e.g. T4(3) = (0011)2), and a negative integer n with −2 N−1 ≤ n is represented using the binary expansion of the (positive) integer 2N + n (e.g. T4(−3) = (1101)2 because 24 + (−3) = 13 = (1101)2). This representation allows us to use ADDN unchanged for both positive and negative integers! To partially prove this claim, show that if a and b are negative integers with −2 N−1 ≤ a + b, then ADDN (TN (a), TN (b)) = TN (a + b). (Hint: In what situation does ADDN (x, y) not equal x + y, and then what does it equal instead?)
Computers and Technology
1 answer:
WITCHER [35]4 years ago
7 0

Answer:

This statement is true if and only if both left most bit of both numbers after conversion in 2's complement are different.

Explanation:

If both numbers left most bit is different in 2's complement then no overflow occur and the results of the equation are same.

ADDN (TN (a), TN (b)) = TN (a + b)

This equation satisfies if and only if, 2's complement of both binary number contains left most bit different. If the left most bit of both numbers is same then after addition the bits will be overflowed and result of addition in decimal and then convert to 2's complement will not be equal and above mentioned equation will not be satisfied.

It means that if both numbers have same sign, then 2's complement of both bit have same bits, if we add those numbers in decimal and add by converting them in 2's complement and add them both have different answers.  

You might be interested in
Please help me. i will mark you brailiest
Stolb23 [73]

Answer:

Simple, really

Explanation:

3Rd one is pretty easy, all you have to do is read closely.

3 0
3 years ago
Which of the following statements is not correct ​
just olya [345]
Wich statements ? I don’t see anything
4 0
3 years ago
Read 2 more answers
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
Which of these devices features D-pads and analog sticks? ASAP PLEASE
Arisa [49]

Answer:

b. portable consoles

Explanation:

hope that helps :)

5 0
3 years ago
Read 2 more answers
In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the
ira [324]

Answer:

True

Explanation:

Frame Tagging is a method Cisco developed to identify packets travelling through links also called VLAN Tagging.

8 0
4 years ago
Other questions:
  • The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
    6·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit
    15·2 answers
  • Craig's annual take-home pay is $75,000. What is the maximum amount that he can spend per month paying off credit cards and loan
    7·2 answers
  • Where can you check effective access on a shared folder? answer?
    11·1 answer
  • After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
    6·1 answer
  • _____ is an example of a locally installed email client.
    5·2 answers
  • opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
    7·1 answer
  • Now tell me how be rich like Bill Gates
    6·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!