EBK COMPUTER SYSTEMS
EBK COMPUTER SYSTEMS
3rd Edition
ISBN: 8220101459107
Author: O'HALLARON
Publisher: YUZU
Question
Book Icon
Chapter 2.2, Problem 2.22PP

A.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

B.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

C.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

    B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

Blurred answer
Students have asked these similar questions
"Please, the answer must be documented from a book, experience, or accurate information without using artificial intelligence." Write a program to read the distance from ultrasonic sensor connected to pin No. A3 and urn ON a RED pin No. 12 when the distance rises from 100cm.
"Please, the answer must be documented from a book, experience, or accurate information without using artificial intelligence." Write an Arduino program to blink (flash) 8- LED's connected to pins (6-13) according to the following sequence: array with delay of 0.1s). (Note: Use Pin 6 Pin 7 Pin 8 Pin 9 Pin 10 Pin 11 Pin 12 Pin 13 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 1 1 11100 0 1 1 1 1 1 1 1 1 1 1 1 1 177 1 1 1 1 1 1 1 1
"Please, the answer must be documented from a book, experience, or accurate information without using artificial intelligence." Suppose you have two push buttons connected to pins 7 & 8 and two LED's connected to pins 9 & 10 of an Arduino. Write a program to turn ON the LED's if the two push buttons are pressed according to the following scenario. push buttons push buttons LED (pin9) LED (pin10) Delay (pin7) (pin8) open open HIGH HIGH 2s closed open LOW HIGH 1s open closed HIGH LOW 1s closed closed LOW LOW 3s

Chapter 2 Solutions

EBK COMPUTER SYSTEMS

Ch. 2.1 - Prob. 2.11PPCh. 2.1 - Prob. 2.12PPCh. 2.1 - Prob. 2.13PPCh. 2.1 - Prob. 2.14PPCh. 2.1 - Prob. 2.15PPCh. 2.1 - Prob. 2.16PPCh. 2.2 - Prob. 2.17PPCh. 2.2 - Practice Problem 2.18 (solution page 149) In...Ch. 2.2 - Prob. 2.19PPCh. 2.2 - Prob. 2.20PPCh. 2.2 - Prob. 2.21PPCh. 2.2 - Prob. 2.22PPCh. 2.2 - Prob. 2.23PPCh. 2.2 - Prob. 2.24PPCh. 2.2 - Prob. 2.25PPCh. 2.2 - Practice Problem 2.26 (solution page 151) You are...Ch. 2.3 - Prob. 2.27PPCh. 2.3 - Prob. 2.28PPCh. 2.3 - Prob. 2.29PPCh. 2.3 - Practice Problem 2.30 (solution page 153) Write a...Ch. 2.3 - Prob. 2.31PPCh. 2.3 - Practice Problem 2.32 (solution page 153) You are...Ch. 2.3 - Prob. 2.33PPCh. 2.3 - Prob. 2.34PPCh. 2.3 - Practice Problem 2.35 (solution page 154) You are...Ch. 2.3 - Prob. 2.36PPCh. 2.3 - Practice Problem 2.37 solution page 155 You are...Ch. 2.3 - Prob. 2.38PPCh. 2.3 - Prob. 2.39PPCh. 2.3 - Practice Problem 2.40 (solution page 156) For each...Ch. 2.3 - Prob. 2.41PPCh. 2.3 - Practice Problem 2.42 (solution page 156) Write a...Ch. 2.3 - Practice Problem 2.43 (solution page 157) In the...Ch. 2.3 - Prob. 2.44PPCh. 2.4 - Prob. 2.45PPCh. 2.4 - Prob. 2.46PPCh. 2.4 - Prob. 2.47PPCh. 2.4 - Prob. 2.48PPCh. 2.4 - Prob. 2.49PPCh. 2.4 - Prob. 2.50PPCh. 2.4 - Prob. 2.51PPCh. 2.4 - Prob. 2.52PPCh. 2.4 - Practice Problem 2.53 (solution page 160) Fill in...Ch. 2.4 - Practice Problem 2.54 (solution page 160) Assume...Ch. 2 - Compile and run the sample code that uses...Ch. 2 - Try running the code for show_bytes for different...Ch. 2 - Prob. 2.57HWCh. 2 - Write a procedure is_little_endian that will...Ch. 2 - Prob. 2.59HWCh. 2 - Prob. 2.60HWCh. 2 - Prob. 2.61HWCh. 2 - Write a function int_shifts_are_arithmetic() that...Ch. 2 - Fill in code for the following C functions....Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: / ...Ch. 2 - You are given the task of writing a procedure...Ch. 2 - Prob. 2.68HWCh. 2 - Write code for a function with the following...Ch. 2 - Write code for the function with the following...Ch. 2 - You just started working for a company that is...Ch. 2 - You are given the task of writing a function that...Ch. 2 - Write code for a function with the following...Ch. 2 - Write a function with the following prototype: /...Ch. 2 - Prob. 2.75HWCh. 2 - The library function calloc has the following...Ch. 2 - Prob. 2.77HWCh. 2 - Write code for a function with the following...Ch. 2 - Prob. 2.79HWCh. 2 - Write code for a function threefourths that, for...Ch. 2 - Prob. 2.81HWCh. 2 - Prob. 2.82HWCh. 2 - Prob. 2.83HWCh. 2 - Prob. 2.84HWCh. 2 - Prob. 2.85HWCh. 2 - Intel-compatible processors also support an...Ch. 2 - Prob. 2.87HWCh. 2 - Prob. 2.88HWCh. 2 - We are running programs on a machine where values...Ch. 2 - You have been assigned the task of writing a C...Ch. 2 - Prob. 2.91HWCh. 2 - Prob. 2.92HWCh. 2 - following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Prob. 2.97HW
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY