COMPUTER SYSTEMS&MOD MSGT/ET SA AC PKG
COMPUTER SYSTEMS&MOD MSGT/ET SA AC PKG
3rd Edition
ISBN: 9780134671123
Author: Bryant
Publisher: PEARSON
Question
Book Icon
Chapter 2.2, Problem 2.22PP

A.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

B.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

C.

Program Plan Intro

Two’s-Complement encodings:

  • The two’s complement encoding is represented by the interpretation function of “B2Tw”.
  • The equation 2.3 is given below

    B2Tw(x)-xw-12w-1+i=0w-2xi2i

  • From the above equation,
    • The function “B2Tw” means “binary to two’s-complements” of length “w”.
    • The notation denotes that the side of left-hand is defined to be equal to the side of right-hand.
    • “xw-1” is the most significant bit. It is also named as “sign bit”.
      • It weight “-2w-1” means the weight is in negation for representation of an unsigned.
        • When the sign bit is set to “1”, then the value is denoted by “negative”.
        • When the sign bit is set to “0”, then the value is denoted by “nonnegative”.
    • The bit length is “w”.
    • A bit vector is x  which is denoted by entire vector or [xw-1,xw-2,........,x0]:
    • Each bit “xi” contains value “0” or “1”.

Example:

The example of “B2Tw” is shown below:

Consider, value of x is “1111” which contains bits length “4”.

Therefore using the above equation, user can compute the B2T4(1111)

B2T4(1111)=-1×23+1×22+1×21+1×20 =-1×8+1×4+1×2+1×1 =-8+4+2+1 =-1

Blurred answer
Students have asked these similar questions
After our initial deployment for our ML home based security system, the first steps we took to contribute further to the project, we conducted load testing, tested and optimize for low latency, and automated user onboarding. What should be next?
Why investing in skills and technology is a critical factor in the financial management aspect of system projects.
why investing in skills and technology is a critical factor in the financial management aspect of systems projects.

Chapter 2 Solutions

COMPUTER SYSTEMS&MOD MSGT/ET SA AC PKG

Ch. 2.1 - Prob. 2.11PPCh. 2.1 - Prob. 2.12PPCh. 2.1 - Prob. 2.13PPCh. 2.1 - Prob. 2.14PPCh. 2.1 - Prob. 2.15PPCh. 2.1 - Prob. 2.16PPCh. 2.2 - Prob. 2.17PPCh. 2.2 - Practice Problem 2.18 (solution page 149) In...Ch. 2.2 - Prob. 2.19PPCh. 2.2 - Prob. 2.20PPCh. 2.2 - Prob. 2.21PPCh. 2.2 - Prob. 2.22PPCh. 2.2 - Prob. 2.23PPCh. 2.2 - Prob. 2.24PPCh. 2.2 - Prob. 2.25PPCh. 2.2 - Practice Problem 2.26 (solution page 151) You are...Ch. 2.3 - Prob. 2.27PPCh. 2.3 - Prob. 2.28PPCh. 2.3 - Prob. 2.29PPCh. 2.3 - Practice Problem 2.30 (solution page 153) Write a...Ch. 2.3 - Prob. 2.31PPCh. 2.3 - Practice Problem 2.32 (solution page 153) You are...Ch. 2.3 - Prob. 2.33PPCh. 2.3 - Prob. 2.34PPCh. 2.3 - Practice Problem 2.35 (solution page 154) You are...Ch. 2.3 - Prob. 2.36PPCh. 2.3 - Practice Problem 2.37 solution page 155 You are...Ch. 2.3 - Prob. 2.38PPCh. 2.3 - Prob. 2.39PPCh. 2.3 - Practice Problem 2.40 (solution page 156) For each...Ch. 2.3 - Prob. 2.41PPCh. 2.3 - Practice Problem 2.42 (solution page 156) Write a...Ch. 2.3 - Practice Problem 2.43 (solution page 157) In the...Ch. 2.3 - Prob. 2.44PPCh. 2.4 - Prob. 2.45PPCh. 2.4 - Prob. 2.46PPCh. 2.4 - Prob. 2.47PPCh. 2.4 - Prob. 2.48PPCh. 2.4 - Prob. 2.49PPCh. 2.4 - Prob. 2.50PPCh. 2.4 - Prob. 2.51PPCh. 2.4 - Prob. 2.52PPCh. 2.4 - Practice Problem 2.53 (solution page 160) Fill in...Ch. 2.4 - Practice Problem 2.54 (solution page 160) Assume...Ch. 2 - Compile and run the sample code that uses...Ch. 2 - Try running the code for show_bytes for different...Ch. 2 - Prob. 2.57HWCh. 2 - Write a procedure is_little_endian that will...Ch. 2 - Prob. 2.59HWCh. 2 - Prob. 2.60HWCh. 2 - Prob. 2.61HWCh. 2 - Write a function int_shifts_are_arithmetic() that...Ch. 2 - Fill in code for the following C functions....Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: /...Ch. 2 - Write code to implement the following function: / ...Ch. 2 - You are given the task of writing a procedure...Ch. 2 - Prob. 2.68HWCh. 2 - Write code for a function with the following...Ch. 2 - Write code for the function with the following...Ch. 2 - You just started working for a company that is...Ch. 2 - You are given the task of writing a function that...Ch. 2 - Write code for a function with the following...Ch. 2 - Write a function with the following prototype: /...Ch. 2 - Prob. 2.75HWCh. 2 - The library function calloc has the following...Ch. 2 - Prob. 2.77HWCh. 2 - Write code for a function with the following...Ch. 2 - Prob. 2.79HWCh. 2 - Write code for a function threefourths that, for...Ch. 2 - Prob. 2.81HWCh. 2 - Prob. 2.82HWCh. 2 - Prob. 2.83HWCh. 2 - Prob. 2.84HWCh. 2 - Prob. 2.85HWCh. 2 - Intel-compatible processors also support an...Ch. 2 - Prob. 2.87HWCh. 2 - Prob. 2.88HWCh. 2 - We are running programs on a machine where values...Ch. 2 - You have been assigned the task of writing a C...Ch. 2 - Prob. 2.91HWCh. 2 - Prob. 2.92HWCh. 2 - following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Following the bit-level floating-point coding...Ch. 2 - Prob. 2.97HW
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L