EBK COMPUTER SYSTEMS
EBK COMPUTER SYSTEMS
3rd Edition
ISBN: 8220101459107
Author: O'HALLARON
Publisher: YUZU
Question
Book Icon
Chapter 2.2, Problem 2.22PP

A.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

B.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

C.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

    B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

Blurred answer
Students have asked these similar questions
Answer the question fully and accurately by providing the required files(Java Code, Two output files and written answers to questions 1-3 in a word document)meaning question 1 to 3 also provide correct answers for those questions.(note: this quetion is not graded).
.NET Interactive Solving Sudoku using Grover's Algorithm We will now solve a simple problem using Grover's algorithm, for which we do not necessarily know the solution beforehand. Our problem is a 2x2 binary sudoku, which in our case has two simple rules: •No column may contain the same value twice •No row may contain the same value twice If we assign each square in our sudoku to a variable like so: 1 V V₁ V3 V2 we want our circuit to output a solution to this sudoku. Note that, while this approach of using Grover's algorithm to solve this problem is not practical (you can probably find the solution in your head!), the purpose of this example is to demonstrate the conversion of classical decision problems into oracles for Grover's algorithm. Turning the Problem into a Circuit We want to create an oracle that will help us solve this problem, and we will start by creating a circuit that identifies a correct solution, we simply need to create a classical function on a quantum circuit that…
.NET Interactive Solving Sudoku using Grover's Algorithm We will now solve a simple problem using Grover's algorithm, for which we do not necessarily know the solution beforehand. Our problem is a 2x2 binary sudoku, which in our case has two simple rules: •No column may contain the same value twice •No row may contain the same value twice If we assign each square in our sudoku to a variable like so: 1 V V₁ V3 V2 we want our circuit to output a solution to this sudoku. Note that, while this approach of using Grover's algorithm to solve this problem is not practical (you can probably find the solution in your head!), the purpose of this example is to demonstrate the conversion of classical decision problems into oracles for Grover's algorithm. Turning the Problem into a Circuit We want to create an oracle that will help us solve this problem, and we will start by creating a circuit that identifies a correct solution, we simply need to create a classical function on a quantum circuit that…

Chapter 2 Solutions

EBK COMPUTER SYSTEMS

Ch. 2.1 - Prob. 2.11PPCh. 2.1 - Prob. 2.12PPCh. 2.1 - Prob. 2.13PPCh. 2.1 - Prob. 2.14PPCh. 2.1 - Prob. 2.15PPCh. 2.1 - Prob. 2.16PPCh. 2.2 - Prob. 2.17PPCh. 2.2 - Practice Problem 2.18 (solution page 149) In...Ch. 2.2 - Prob. 2.19PPCh. 2.2 - Prob. 2.20PPCh. 2.2 - Prob. 2.21PPCh. 2.2 - Prob. 2.22PPCh. 2.2 - Prob. 2.23PPCh. 2.2 - Prob. 2.24PPCh. 2.2 - Prob. 2.25PPCh. 2.2 - Practice Problem 2.26 (solution page 151) You are...Ch. 2.3 - Prob. 2.27PPCh. 2.3 - Prob. 2.28PPCh. 2.3 - Prob. 2.29PPCh. 2.3 - Practice Problem 2.30 (solution page 153) Write a...Ch. 2.3 - Prob. 2.31PPCh. 2.3 - Practice Problem 2.32 (solution page 153) You are...Ch. 2.3 - Prob. 2.33PPCh. 2.3 - Prob. 2.34PPCh. 2.3 - Practice Problem 2.35 (solution page 154) You are...Ch. 2.3 - Prob. 2.36PPCh. 2.3 - Practice Problem 2.37 solution page 155 You are...Ch. 2.3 - Prob. 2.38PPCh. 2.3 - Prob. 2.39PPCh. 2.3 - Practice Problem 2.40 (solution page 156) For each...Ch. 2.3 - Prob. 2.41PPCh. 2.3 - Practice Problem 2.42 (solution page 156) Write a...Ch. 2.3 - Practice Problem 2.43 (solution page 157) In the...Ch. 2.3 - Prob. 2.44PPCh. 2.4 - Prob. 2.45PPCh. 2.4 - Prob. 2.46PPCh. 2.4 - Prob. 2.47PPCh. 2.4 - Prob. 2.48PPCh. 2.4 - Prob. 2.49PPCh. 2.4 - Prob. 2.50PPCh. 2.4 - Prob. 2.51PPCh. 2.4 - Prob. 2.52PPCh. 2.4 - Practice Problem 2.53 (solution page 160) Fill in...Ch. 2.4 - Practice Problem 2.54 (solution page 160) Assume...Ch. 2 - Compile and run the sample code that uses...Ch. 2 - Try running the code for show_bytes for different...Ch. 2 - Prob. 2.57HWCh. 2 - Write a procedure is_little_endian that will...Ch. 2 - Prob. 2.59HWCh. 2 - Prob. 2.60HWCh. 2 - Prob. 2.61HWCh. 2 - Write a function int_shifts_are_arithmetic() that...Ch. 2 - Fill in code for the following C functions....Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: / ...Ch. 2 - You are given the task of writing a procedure...Ch. 2 - Prob. 2.68HWCh. 2 - Write code for a function with the following...Ch. 2 - Write code for the function with the following...Ch. 2 - You just started working for a company that is...Ch. 2 - You are given the task of writing a function that...Ch. 2 - Write code for a function with the following...Ch. 2 - Write a function with the following prototype: /...Ch. 2 - Prob. 2.75HWCh. 2 - The library function calloc has the following...Ch. 2 - Prob. 2.77HWCh. 2 - Write code for a function with the following...Ch. 2 - Prob. 2.79HWCh. 2 - Write code for a function threefourths that, for...Ch. 2 - Prob. 2.81HWCh. 2 - Prob. 2.82HWCh. 2 - Prob. 2.83HWCh. 2 - Prob. 2.84HWCh. 2 - Prob. 2.85HWCh. 2 - Intel-compatible processors also support an...Ch. 2 - Prob. 2.87HWCh. 2 - Prob. 2.88HWCh. 2 - We are running programs on a machine where values...Ch. 2 - You have been assigned the task of writing a C...Ch. 2 - Prob. 2.91HWCh. 2 - Prob. 2.92HWCh. 2 - following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Prob. 2.97HW
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L