1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
9

Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b

ias of 7 for the exponent (there is no implied 1 as in IEEE).
a) What is the largest number (in binary) that can be stored? Estimate it in decimal.
b) What is the smallest positive number( closest to 0) that can be stored in binary? Estimate it in decimal.
c) Describe the steps for adding two floating point numbers.
d) Describe the steps for multiplying two floating point numbers.
Computers and Technology
1 answer:
Andrew [12]3 years ago
6 0

Answer:

Detailed answers given in the solution

Explanation:

a)

max exponent= 1111=15

in biased form =15-7=8

max significant=1111=(.9375)10

max value= 1.9375*28

b) min exp= 0000=0-7=-7(biased)

min value=1.0000*2(-7)

c) Addition : Suppose we want to add two floating point numbers, X and Y.

steps to add floating point numbers:

Make exponents of the two numbers to be the same (if not). We do this by rewriting .

Add the two mantissas of X and the Y together.

If the sum in the previous step does not have a single bit of value 1, left of the radix point, then adjust the radix point and exponent until it does.

Convert back to the one byte floating point representation.

d) Multiplication :

Suppose you want to multiply two floating point numbers, X and Y.

steps to multiply floating point numbers.

sum of the two exponents..

Multiply the mantissa of X to the mantissa of Y. Call this result m.

If m is does not have a single 1 left of the radix point, then adjust the radix point so it does, and adjust the exponent z to compensate.

Add the sign bits, mod 2, to get the sign of the resulting multiplication.

Convert back to the one byte floating point representation, truncating bits if needed.

You might be interested in
A runner has a speed of 5m/ s and a mass of 130 kg. what is his kinetic energy?
kondaur [170]

Answer:

0.001625

Explanation:

if the velocity of an object is lower than 1% of light speed

8 0
2 years ago
the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world’s ICT capabil
kvasek [131]

Answer:

hi

Explanation:

5 0
2 years ago
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
What does NVRAM stand for
Julli [10]
Non-Volatile Random Access Memory
7 0
3 years ago
Read 2 more answers
The ideal body position for your legs after you've adjusted your seat is with your knee ___.
Kipish [7]

Answer:

is slightly crooked when pressing the pedals. This answer has been confirmed as correct and helpful

Explanation:

Hope it helps

7 0
3 years ago
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • I really need help please abari is writing a program which prompts a user for a value without a decimal. Which function should h
    8·1 answer
  • Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
    6·1 answer
  • The set of communications rules for exchanging information electronically on the internet is called the ________.
    10·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    9·2 answers
  • Ladders are a fundamental piece of equipment on construction sites and employers are expected to ensure that workers follow safe
    5·1 answer
  • What additional uses of technology can you see in the workplace? List ways technology impacts
    5·1 answer
  • In the early 1800's, a “computer" was not a machine, it was a person who did math
    8·2 answers
  • Red + blue =<br>Red + green =<br>Magenta - blue =<br>Yellow - green =<br>Cyan - blue =​
    9·1 answer
  • What is the output of the following code?<br> print (12 // 6)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!