Question

In: Computer Science

1. A hypothetical computer stores 12 bits of information. The first bit is used for the...

1. A hypothetical computer stores 12 bits of information. The first bit is used for the sign of the number; the second bit is used for the sign of the exponent. Four bits are used for the magnitude of the exponent and six bits are used for the magnitude of the mantissa.

a. Represent the number -147.32 in Binary scientific notation

b. How would the number be represented in the computer?

c. Calculate the true error and absolute relative true error

Solutions

Expert Solution

​​​​​​

ANSWER:

A) -147.32 IN BINARY SCIENTIFIC NOTATION = -1.001001101010001×2^7

B) The computer representation of -147.32 = 101000001001

C) True error = -0.00359374999

Absolute error = 0.00359374999

Relative error = 0.00002439417%

Explaination-


Related Solutions

A 64 bit computer uses a memory of 32KB. Work out the number of bits of...
A 64 bit computer uses a memory of 32KB. Work out the number of bits of AR, DR, PC, AC, and the HEX code of the address of last memory location. b) The memory attached to a processor has access time of 400ns. When a cache memory is introduced in the system, it is found that on average the access time for the computer was 30% greater than the cache access time for a miss ratio of 0.10. Work out...
In a computer instruction format, the instruction length is 12 bits and the size of an...
In a computer instruction format, the instruction length is 12 bits and the size of an address field is 5 bits. The system architect has already designed three 2-address instructions and thirty one 1-address instructions. How many 0-address instructions can still be possibly accommodated?
Write a computer program that stores and tracks information about high school students. The first piece...
Write a computer program that stores and tracks information about high school students. The first piece of information is what grade the student is in. Since this is for high school, the available values are 9, 10, 11, and 12. We also want to track the student’s GPA. Examples of GPAs are 2.2, 2.6, and 4.0. Finally, we want to track the letter grade that the student got on his or her final exam. These values are A, B, C,...
IEEE 754 format of 32-bit floating-point is as follows. 1 8 (bits) 23 (bits) What’s stored...
IEEE 754 format of 32-bit floating-point is as follows. 1 8 (bits) 23 (bits) What’s stored in each region? What’s the bias value and how to get it? For decimal fraction: – 0.625, please represent it as given format (Note: you must show the specific procedure/stepsin order to get full credits. If you only present final result directly, you will only get half of the credits even if it is correct.).  
Computer Architecture 1. Define what a "word" is in computer architecture: The size (number of bits)...
Computer Architecture 1. Define what a "word" is in computer architecture: The size (number of bits) of the address The total number of bits of an instruction (e.g. 16 bits) Word and width are synonymous. A word is the contents of a memory register. 2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer) They are both the same! Address is the same for...
1. Give the signed decimal value of A93 (12 bits, show work)
1. Give the signed decimal value of A93 (12 bits, show work)
1. How many 12-bit strings (that is, bit strings of length 14) start with the sub-string...
1. How many 12-bit strings (that is, bit strings of length 14) start with the sub-string 011? 2. You break your piggy bank to discover lots of pennies and nickels. You start arranging them in rows of 6 coins. How many coins would you need to make all possible rows of 6 coins (not necessarily with equal numbers of pennies and nickels)? 3. How many shortest lattice paths start at (4, 4) and end at (13, 13)? 4. What is...
(2) More inclusion-exclusion counting: How many bit strings of length 15 have bits 1, 2, and...
(2) More inclusion-exclusion counting: How many bit strings of length 15 have bits 1, 2, and 3 equal to 101, or have bits 12, 13, 14, and 15 equal to 1001 or have bits 3, 4, 5, and 6 equal to 1010? (Number bits from left to right. In other words, bit #1 is the left most bit and bit #15 is the right most bit.) Hint: The fact that the third bit appears in two of the required patterns...
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on...
(1) What is the most common technique used for finding duplicate blocks/data? A. Bit-for-bit comparisons on all new blocks B. Hashing/fingerprinting C. Encryption D. Storing all blocks in an content addressable object store (2) Which of the following describes sub-LUN auto-tiering? A. Placing data on tiers depending on its access pattern B. Placing data on different tiers of storage based on when the blocks were written C. Placing data on tiers of storage based on the LUN name D. Placing...
QUESTION 21 chmod +t is used to: set timing information set group information set sticky bit...
QUESTION 21 chmod +t is used to: set timing information set group information set sticky bit set transit information 1 points    QUESTION 22 When two or processes are waiting indefinitely for an event that can be caused by only one of the waiting processes, we call this as: Race condition Deadlock Starvation None of the above 1 points    QUESTION 23 ___________ is a fast disk space, large enough to store data for all users. Hard disk Main memory...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT