1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
3 years ago
8

You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we

have 48 bits at our disposal in order to represent a number, in analogy with the IEEE 754 prototype. You are asked to provide: a) The types for evaluating this number b) The width of representation of these numbers (upper and lower) 6 c) The maximu

Computers and Technology
1 answer:
Rasek [7]3 years ago
4 0

Answer:

Check the explanation

Explanation:

The most significant bit is the sign bit (S), with 0 for positive numbers and 1 for negative numbers.

   Normalize significand: 1.0 ? |significand| < 2.0

       Always has a leading pre-binary-point 1 bit, so no need to represent it explicitly (hidden bit)

   The following 9 bits represent exponent (E).(0 TO 511)

       E is : actual exponent + Bias

       Bias = 255;

   The remaining 38 bits represents fraction (F).

Width of representation

smallest value :

   Exponent: 000000001 because 000000000 is reserved

       actual exponent = 1 – 255 = –254

   Fraction: 000…00  \rightarrow significand = 1.0

Kindly check the attached image below to see the concluding solution to the question above.

You might be interested in
"As part of integrating your solution your client indicates that they have certain technologies enabled on their network that al
erastovalidia [21]

Answer:

quality of service

Explanation:

6 0
3 years ago
You can tell when an image is selected, because its sizing handles will be visible. True or False
Ivenika [448]

This is true because you can go and check yourself in Word and you can click on an image and the sizing handles will appear.

hope that helps :)

8 0
3 years ago
Read 2 more answers
it is a program a personal computer microprocessor uses to get the computer system started after you turn it on​
Fofino [41]

Explanation:

please repeat your question

5 0
3 years ago
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
Brut [27]
If you include all zeroes, then it should be 1,000,000,000. Otherwise it’s 999,999,999.

Think of how between 0-9 theres 10 numbers, and use that logic towards 000000000-999999999
3 0
3 years ago
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
3 years ago
Read 2 more answers
Other questions:
  • Electrical pressure is also called
    5·2 answers
  • The most direct way for Jonothan to gain on-the-jib experience and earn money while attending school is to apply for
    14·1 answer
  • You're the sole IT employee at your company, and you don't know how many users or computers are in your organization. Uh oh! Wha
    8·1 answer
  • How to be fluent in computer
    10·2 answers
  • Which printer are used to print text and graphics with high speed ​
    15·1 answer
  • A multi-national retail company has multiple business divisions with each division having its own AWS account. The engineering t
    9·1 answer
  • Please be my friend. my best and only friend isn't talking to me for some reason
    9·2 answers
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    13·1 answer
  • What is the name of the arm that is attached to the read/write head?
    13·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!