Question

List three ways by which signed binary integers can be represented in a computer architecture.

List three ways by which signed binary integers can be represented in a computer architecture.

Homework Answers

Answer #1

Ans) Now the 3 ways to represent signed numbers in computer are:-

1) The sign-magnitude binary format :- It all depends on maximum significant bit i.e. MSD.
So there are 2 factors:-
a) if MSD is 0 than it is signed as positive one.
b) if MSD is 1 than it is signed as negative one.

2) One’s Complement representation:- It represents positive numbers by their binary equivalents and negative numbers by their 1’s complements. To calculate 1’s complement, replace every 0 with 1 and every 1 with 0.

3) Two’s Complement representation:- It represents positive numbers by their binary equivalents and negative numbers by their 2’s complements. To calculate 2’s complement, add 1 to its 1’s complement.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
1. List the three ways in which Heat can be transferred and include an example of...
1. List the three ways in which Heat can be transferred and include an example of each. Make sure to describe the differences between them. 2. What is the Ginsberg's Theorem? (preferably explaining in your own words too Please question 1 and 2
How many ways can we pick three distinct integers from {1,2, ...,15} such that their sum...
How many ways can we pick three distinct integers from {1,2, ...,15} such that their sum is divisible by 3?
Sign extension means that any given signed number can be represented with more bits by simply...
Sign extension means that any given signed number can be represented with more bits by simply repeating the sign bit. For example, 0005 = +5 and 00005 = +5. This holds true for negative numbers as well. For example, 1011 = -5 and 11011 = -5. Also, 11111011 = -5. Using finite summation notation, prove that sign extension can be applied to any 2's complement binary integer, B, with b number of bits
List five ways in which procedures can be produced
List five ways in which procedures can be produced
List three ways in which on can move between isoquants? How do you decide the number...
List three ways in which on can move between isoquants? How do you decide the number of workers to hire? Please describe the common progression with respect to returns to scale. Compare economies of scope with economies of scale. What is the sunk cost fallacy?
List three ways that government policymakers can respond to the problem of monopoly. Explain precisely.
List three ways that government policymakers can respond to the problem of monopoly. Explain precisely.
5.8 Explain how the following conditions can be represented as linear constraints using binary variables. (a)...
5.8 Explain how the following conditions can be represented as linear constraints using binary variables. (a) Either x1 + x2 ? 3 or 3x1 + 4x2 ? 10 (b) Variable x2 can assume values 0, 4, 7, 10, and 12 only (c) If x2 ? 3, then x3 ? 6; Otherwise x3 ? 4 (assume x2 and x3 are integers) (d) At least 2 out of the following 5 constraints must be satisfied: x1 + x2 <=7 x1 ? x2...
Let R be a relation on a set of integers, which is represented by: a R...
Let R be a relation on a set of integers, which is represented by: a R b if and only if a = 2 ^ k.b, for some integer k. Check if the relation R is an equivalent relation!
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways...
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways such undesired programs negatively affect its host or target computers. b) Render in an elaborative manner, some defensive measures that one can take to protect host or target computers from malicious computer programs. a) A notable attack recorded in the computing fraternity in October 2002 was successfully launched against the Internet’s 13 root servers, which act as the Internet’s ultimate authority with respect to...
a) List three ways in which meiosis differs from mitosis. b) Which part of this process...
a) List three ways in which meiosis differs from mitosis. b) Which part of this process is most similar to mitosis, the first or second division (meiosis I or meiosis II)? Be sure to explain your answer - WHY do you think that division is most similar?