EBK COMPUTER SYSTEMS
EBK COMPUTER SYSTEMS
3rd Edition
ISBN: 8220101459107
Author: O'HALLARON
Publisher: YUZU
Question
Book Icon
Chapter 2.2, Problem 2.22PP

A.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

B.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

C.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

    B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

Blurred answer
Students have asked these similar questions
1. Complete the routing table for R2 as per the table shown below when implementing RIP routing Protocol? (14 marks) 195.2.4.0 130.10.0.0 195.2.4.1 m1 130.10.0.2 mo R2 R3 130.10.0.1 195.2.5.1 195.2.5.0 195.2.5.2 195.2.6.1 195.2.6.0 m2 130.11.0.0 130.11.0.2 205.5.5.0 205.5.5.1 R4 130.11.0.1 205.5.6.1 205.5.6.0
Analyze the charts and introduce each charts by describing each. Identify the patterns in the given data. And determine how are the data points are related.   Refer to the raw data (table):
3A) Generate a hash table for the following values: 11, 9, 6, 28, 19, 46, 34, 14. Assume the table size is 9 and the primary hash function is h(k) = k % 9. i) Hash table using quadratic probing ii) Hash table with a secondary hash function of h2(k) = 7- (k%7) 3B) Demonstrate with a suitable example, any three possible ways to remove the keys and yet maintaining the properties of a B-Tree. 3C) Differentiate between Greedy and Dynamic Programming.

Chapter 2 Solutions

EBK COMPUTER SYSTEMS

Ch. 2.1 - Prob. 2.11PPCh. 2.1 - Prob. 2.12PPCh. 2.1 - Prob. 2.13PPCh. 2.1 - Prob. 2.14PPCh. 2.1 - Prob. 2.15PPCh. 2.1 - Prob. 2.16PPCh. 2.2 - Prob. 2.17PPCh. 2.2 - Practice Problem 2.18 (solution page 149) In...Ch. 2.2 - Prob. 2.19PPCh. 2.2 - Prob. 2.20PPCh. 2.2 - Prob. 2.21PPCh. 2.2 - Prob. 2.22PPCh. 2.2 - Prob. 2.23PPCh. 2.2 - Prob. 2.24PPCh. 2.2 - Prob. 2.25PPCh. 2.2 - Practice Problem 2.26 (solution page 151) You are...Ch. 2.3 - Prob. 2.27PPCh. 2.3 - Prob. 2.28PPCh. 2.3 - Prob. 2.29PPCh. 2.3 - Practice Problem 2.30 (solution page 153) Write a...Ch. 2.3 - Prob. 2.31PPCh. 2.3 - Practice Problem 2.32 (solution page 153) You are...Ch. 2.3 - Prob. 2.33PPCh. 2.3 - Prob. 2.34PPCh. 2.3 - Practice Problem 2.35 (solution page 154) You are...Ch. 2.3 - Prob. 2.36PPCh. 2.3 - Practice Problem 2.37 solution page 155 You are...Ch. 2.3 - Prob. 2.38PPCh. 2.3 - Prob. 2.39PPCh. 2.3 - Practice Problem 2.40 (solution page 156) For each...Ch. 2.3 - Prob. 2.41PPCh. 2.3 - Practice Problem 2.42 (solution page 156) Write a...Ch. 2.3 - Practice Problem 2.43 (solution page 157) In the...Ch. 2.3 - Prob. 2.44PPCh. 2.4 - Prob. 2.45PPCh. 2.4 - Prob. 2.46PPCh. 2.4 - Prob. 2.47PPCh. 2.4 - Prob. 2.48PPCh. 2.4 - Prob. 2.49PPCh. 2.4 - Prob. 2.50PPCh. 2.4 - Prob. 2.51PPCh. 2.4 - Prob. 2.52PPCh. 2.4 - Practice Problem 2.53 (solution page 160) Fill in...Ch. 2.4 - Practice Problem 2.54 (solution page 160) Assume...Ch. 2 - Compile and run the sample code that uses...Ch. 2 - Try running the code for show_bytes for different...Ch. 2 - Prob. 2.57HWCh. 2 - Write a procedure is_little_endian that will...Ch. 2 - Prob. 2.59HWCh. 2 - Prob. 2.60HWCh. 2 - Prob. 2.61HWCh. 2 - Write a function int_shifts_are_arithmetic() that...Ch. 2 - Fill in code for the following C functions....Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: / ...Ch. 2 - You are given the task of writing a procedure...Ch. 2 - Prob. 2.68HWCh. 2 - Write code for a function with the following...Ch. 2 - Write code for the function with the following...Ch. 2 - You just started working for a company that is...Ch. 2 - You are given the task of writing a function that...Ch. 2 - Write code for a function with the following...Ch. 2 - Write a function with the following prototype: /...Ch. 2 - Prob. 2.75HWCh. 2 - The library function calloc has the following...Ch. 2 - Prob. 2.77HWCh. 2 - Write code for a function with the following...Ch. 2 - Prob. 2.79HWCh. 2 - Write code for a function threefourths that, for...Ch. 2 - Prob. 2.81HWCh. 2 - Prob. 2.82HWCh. 2 - Prob. 2.83HWCh. 2 - Prob. 2.84HWCh. 2 - Prob. 2.85HWCh. 2 - Intel-compatible processors also support an...Ch. 2 - Prob. 2.87HWCh. 2 - Prob. 2.88HWCh. 2 - We are running programs on a machine where values...Ch. 2 - You have been assigned the task of writing a C...Ch. 2 - Prob. 2.91HWCh. 2 - Prob. 2.92HWCh. 2 - following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Prob. 2.97HW
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L