Sunday, February 24, 2019

Computing and Ieee-754 Floating-point

1. Name the ternary ways in which signed integers sess be represented in digital computing devicesand explain the differences. 2. Which one of the cardinal integer representations is used most often by digital computing machinesystems? 3. How are complement systems like the odometer on a ride? 4. Do you think that double-dabble is an easier rule than the other binary-to-decimalconversion methods explained in this chapter? why? 5. With reference to the previous question, what are the drawbacks of the other twoconversion methods? . What is flood tide and how cannister it be detected? How does overflow in unsigned numbers gamediffer from overflow in signed numbers? 7. If a computer is capable only of manipulating and storing integers, what difficultiespresent themselves? How are these difficulties overcome? 8. What are the three component parts of a floating-point number? 9. What is a biased exponent, and what efficiencies can it provide? 10. What is normalization and why is it necessary? 11.Why is there always slightly degree of error in floating-point arithmetic when performedby a binary digital computer? 12. How many bits long is a double-precision number down the stairs the IEEE-754 floating-pointstandard? 13. What is EBCDIC, and how is it related to BCD? 14. What is ASCII and how did it originate? 15. How many bits does a Unicode character gestate? 16. Why was Unicode created? 17. Why is non-return-to-zero coding avoided as a method for report information to a magnetic criminal record? 18.Why is Manchester coding not a good choice for writing data to a magnetic disk? 19. Explain how run-length-limited encoding works. 20. How do cyclic redundancy checks work? 21. What is doctrinal error detection? 22. What is a roleplay code? 23. What is meant by Hamming duration and why is it important? What is meant by minimumHamming distance? 24. How is the number of redundant bits necessary for code related to the number of databits? 25. What is a burst error? 26. Name an error detection method that can compensate for burst errors.

No comments:

Post a Comment