subject

4. (??, 22 pts) We saw in lecture methods to store integers (both negative and non-negative) and real numbers as sequences of 0s and 1s. Integers can be stored exactly (using binary numbers and/or 2’s complement), but real numbers must be approximated by rational numbers. In decimal (base 10), a rational number can be expanded as, for example, 11 8 = 1.375. That is, 11 8 = 1 × 100 + 3 × 10−1 + 7 × 10−2 + 5 × 10−3 . In a similar fashion, we can expand a rational number in binary, 11 8 = · · · # × 2 0 + # × 2 −1 + # × 2 −2 + # × 2 −3 + · · · = 1 × 2 0 + 0 × 2 −1 + 1 × 2 −2 + 1 × 2 −3 . Thus, we can write 11/8 as 1.011 in binary; thereby converting it to a sequence of 0s and 1s (and a decimal—binary?—point). (a) Is 0.1 the binary expansion of 1/2? Explain why or why not. (b) Determine the binary expansion of 45/16. Remember that a rational number is a number that can be written as a ratio of integers, such as 1/2, 3/4, and 5/1.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 19:30
Which of the following are types of formatting you can apply to a spreadsheet? choose all that apply.
Answers: 3
question
Computers and Technology, 22.06.2019 03:00
How can i clip a picture to a question on the computer?
Answers: 1
question
Computers and Technology, 22.06.2019 11:30
Write a function so that the main program below can be replaced by the simpler code that calls function original main program: miles_per_hour = float( minutes_traveled = float( hours_traveled = minutes_traveled / 60.0 miles_traveled = hours_traveled * miles_per_hour print('miles: %f' % miles_traveled) sample output with inputs: 70.0 100.0 miles: 116.666667
Answers: 3
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
You know the right answer?
4. (??, 22 pts) We saw in lecture methods to store integers (both negative and non-negative) and rea...
Questions
question
English, 12.08.2021 06:10
question
English, 12.08.2021 06:10
question
Mathematics, 12.08.2021 06:10
question
Mathematics, 12.08.2021 06:20
question
Computers and Technology, 12.08.2021 06:20
question
Mathematics, 12.08.2021 06:20
Questions on the website: 13722361