Test 1 Flashcards
The unsigned binary range for six bit cell:
000000 to 11 1111 .
0-63
(2^n )-1
In fractional values the quantity 1/2 exactly representable in the binary and decimal systems, but is not in the _________ numbering system .
Ternary Base 3
Fractional decimal values have __________ to the right of the decimal point.
nonzero digits
Fractional values of other radix systems have nonzero digits to the:
Right if the radix point
Numerals to the right of a radix point represent:
Negative powers of the radix
As with whole-number conversions, you can use either of two methods:
a subtraction method or an easy multiplication methods
The subtraction method for fractions is identical to the subtraction method for whole numbers. Instead of subtracting positive powers of the target radix, we:
subtract negative powers of the radix.
We always start with the largest value first ______ where ___ is our radix, and work our way along using larger negative exponents.
n^-1
n
When adding two binary numbers , it is possible for each number to be in the range for the number of bits in the storage cell but for their sum to be out of range.
Carry bit
To represent signed integers, computer systems allocate the ______ bit to indicate the sign of a number
high -order
The _______ bit is the leftmost bit. It is also called the most significant bit.
High-order
There are three ways in which signed binary integers may be expressed:
Signed magnitude
One’s complement
Two’s complement
In an 8-bit word, ___________ representation places the absolute value of the number in the 7 bits to the right of the sign bit.
Signed magnitude
Signed magnitude representation is easy for people to understand, but it requires:
complicated computer hardware because you have to hardware for adding and subtracting .
Another disadvantage of signed magnitude is that it allows:
two different representations for zero : positive zero and negative zero .
Two representations for zero are reasons (among others ) computers systems employ _____________ for numeric value representation .
complement systems
In complement systems, negative values are represented by some difference
between a number and its base .
The ____________ of a non zero number N in base r with d digits is (r^ d; 1)-N
diminished radix complement
_____________ are useful because they eliminate the need for subtraction. The difference of two values is found by adding the minuend to the complement of the subtrahend.
Complement systems
One’s complement is simpler to implement than
signed magnitude.
But ___________ still has the disadvantage of having two different representations for zero : positive zero and negative zero. ___________ solves this problem.
Ones complement
Twos complement
___________ is the radix complement of the binary numbering system; the radix complement of a non- zero number N in base r with d digits is r ^ d - N
Two’s complement
With twos complement:
If the number is positive:
If the number is negative:
just convert it to binary and you’re done .
find the one’s complement of the number and then add 1 .
In 8 bit binary, 3 is:
- 3 In ones complement:
- 3 In twos complement:
0000 0011
1111 1100
1111 1101
Range for signed binary integers
1111 to 0111
-7 to 7
Range for ones complement
1000 to 0111
-7 to 7
Range for twos complement
1000 to 0111
-8 to 7
When we use any finite number of bits to represent a number, we always run the risk of.
the result of our calculations becoming too large or too small to be stored in the computer
While we can’t always prevent overflow , we can always ______ overflow.
Detect
In complement arithmetic , an overflow condition is ____ to detect.
Easy
Status bits:
N = 1 N = 0 Z = 1 Z = 0 V = 1 V = 0 C = 1 C = 0
Neg Otherwise Result is all zeros Otherwise Signed internet overflow Otherwise And unsigned integer overflow Otherwise
The purpose of ____________ is to specify precisely the effect of a hardware operation .
Register Transfer Language (RTL)
RTL specification of OR operation
c
Because computer memories are binary, alphabetic characters must be coded to be stored in memory .
ASCII
ASCH is a __________ codethere are ____ ASCII characters.
Seven-bit
128
Since most computers use 8-bits for storage, can use the 8th bit for:
Error checking
ASCII value of A is ____
So parity bit is:
65
1: 11000001
The _____________ was established to collect and catalog all the alphabets of all the spoken languages in the world, both current and ancient, as a first step toward a standard system for worldwide information interchange .
Unicode Consortium
Unicode organizes characters into _______, not __________.
Scripts
Languages
Each character in every script has unique identifying number, usually written in hexadecimal, and is called a _________.
code point
The hexadecimal number is preceded by “____” to indicate it is a Unicode code point .
U+
Corresponding to the code point is a ______, which is the graphic representation of the symbol on the page or screen.
Glyph
The signed magnitude , one’s complement , and two’s complement representations deal with _________ values only.
signed integer
Floating-point values are stored using a __________ of scientific notation. With these modification , these formats are useful in scientific and business applications that deal with real number values.
binary version
Fractional values can be approximated in ___ base systems .
All
Unlike integer values, fractions do not necessarily have:
exact representations under all radices.
The quantity ______ does not have an exact representation in the binary numbering system and must be approximated .
0.2 (dec)
If we are clever programmers, we can perform _______ calculations using any integer format .
floating- point
Float point calculations using any integer format is called ______________ , because floating point values aren’t stored as such ; we just create programs that make it seem as if floating - point values are being used .
floating -point emulation
Most of today’s computers are equipped with specialized hardware that performs _____________ with no special programming required.
floating-point arithmetic
Computers use a form of scientific notation for floating -point representation Numbers written in scientific notation have three components
Sign mantissa Exponent
\ | /
+ 1.25 x 10^-1
To resolve the problem of synonymous forms , we establish a rule that the first digit of the significand must be 1, with no ones to the left of the radix point This process, called ___________, results in a unique pattern for each floating-point number.
Normalization
To provide for negative exponents , we will use a
biased exponent
is a number that is approximately midway in the range of values expressible by the exponent. We subtract the bias from the value in the exponent to determine its true value.
Bias
In our case, we have a 8-bit exponent. We will use 127 for our bias . This is called
excess - 127 representation .
The IEEE -754 __________ floating point standard uses an -bit exponent ( with a bias of 127) and a 23-bit significand .
single precision
The IEEE-754 ___________ standard uses an 11-bit exponent (with a bias of 1023) and a 52 -bit significand .
double precision
In both the IEEE single-precision and double precision floating- point standard , the significant has an implied __ to the ______ of the radix point .
1
Left
Range and precision of IEEE 754 single precision.
-127 to 128
0000 0000…6 to 1111 1111…6
Special values
-
-
-
- programmers should avoid testing floating point values for equality to:
- ________ zeros does not equal ________ zeros
Zero
Exponent field all 0’s
Significand all 0’s
There is a +0 and a -0
Programmers should avoid testing floating point values for equality to zero Negative zero does not equal positive zero
Methods to describe a combinational circuit
Truth table
Boolean expression
Logic diagram
Three basic operations Boolean algebra
Binary OR +
Binary AND •
Unary Complement ‘
The Null Law is also called the:
The Inverse Law is also called:
Zero Theorem.
Complement or Negation
To obtain dual expression.
Exchange ____ and _____
Exchange ____ and _____
+ and •
1 and 0
An interconnection of logic gates. Closely resembles the hardware
Logic diagrams
Set theory representation
___ gate is set union
___ gate is set intersection
___ is set complement
Or
And
Inverter
In the sum-of-products form:
And variables are or together
Ex: F(x,y,z) = xy + xz + yz
In the product-of-sums form:
In the or variables are and together
Ex: F(x,y,z) = (x+y) + (x+z) + (y+z)
The term has evolved to mean any stored program computer in which an instruction fetch and a data operation cannot occur the same time because they share a common bus. often limits the performance of the system
Von Neumann architecture
states that the number of transistors on microchip doubles every years. The obzervation was made by Gordon in 1965 the co-founder of He thought about the concept observing the trend of chip manufacturing at Intel However todaythe transistors are doubled in a faster pace than two years. Every and then companies bring out the faster and version of their electronic products for example cell phones.
Moore’s law
law that the cost of semiconductor chup fabrication planit doubles years. It is the prediction to produce every 4 years.
Rocks law
(February 29, 1860 - November 171929)
American of tabulating machine that was an important precursor the electronic computer. The tabulating machine was an electromechanical machine designed to assist information stored on puriched cards. The machine was developed to help data US Census.
Hollerith, Herman
the first to realize that a computer had applications other than just calculation and was the first one credited the creation of the computer algorithm. is also considered the first computer programmer due to this
Ada Lovelace
Invented the:
Difference Engine - An early calculating machine, verging on being the first computer designed to calculate and tabulate polynomial functions.
The Analytical Engine was to be a general-purpose fully program -controlled , automatic mechanical digital Considered to be the first computer Much more than a calculator
Charles Babbage
Designed the first integrated circuit. Made out of germanium.
Jack kilby
nicknamed as the Mayor of Silicon Valley, was know for realizing the abilities of the first integrated monolith chip which gave Valley its name. also cofounded both the Fairchild semiconductor in 1957 and the Intel Corporation in 1968
Robert Noyce
These two scientists were credited with the invention of the Electronic Numerical Integrator and Computer, first general-purpose electronic digital computer
This invention was completed in 1946 at University of Pennsylvania’s Moore School of Engineering
The general idea of this invention is that computers would use electricity to think
John mauchy and J.presper eckert
is an encoding, just like ASCII which is represented with bytes. The difference is that the encoding can represent every Unicode character while the ASCII encoding can’t. But they’re both still bytes it isn’t encoded or represented by any particular sequence of bytes.
UTF-8
Importance of the Principle of Equivalence of Hardware and Software
states that Any task done by software can also be done using hardware, and any operation performed directly hardware can be done using software assuming speed is not concern.
hardware speed is usually faster than the software
used vacuum tubes the basic components memory and Circuitry CPU. They machine languagecould only cine problem at a time were expensive, used lot of electricity, and were often unreliableSome first generation computers were ENIAC, EDVAC,UNIVAC,IBM-170, and IBM-650
The first generation computers
In this generation was transistor computer, is a computer which uses discrete transistors instead of vacuum tubes. A second generation computer through the late 1950s and 1960s featured circuit boards filled with individual transistors and magnetic core memory
2nd generation computer
were computers that emerged due to the development of the integrated.Their main feature was the use of integrated circuits, which allowed them to be shrunk down to be as small as toasters. Because of this they gained the name microcomputers because compared to second generation computers would occupy entire rooms and buildings, they were quite smallWell- known computers in this generation include the DEC series and the IBM-360 series computers.
Third generation computers