+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

problem 1) The storage and representation of numbers in a computer can lead to costly mistakes because of precision errors. When using floating point numbers, one must make sure that the correct number of digits is used in a calculation because rounding errors can produce values that lead to errors. Consider the floating point format, exponential format, and binary coded decimal (BCD).

prepare a four to five page paper in which you:

1. Analyze the floating point format in order to:

a. Determine how floating point numbers are stored in memory.

b. Discuss the ease or difficulty of manipulating and using floating point numbers in arithmetic calculations.

2. Determine whether or not you believe that the floating point format is memory efficient. Provide a rationale to support your answer.

3. Analyze the format used to store numbers using the binary coded decimal format. Determine whether the BCD format is more or less memory efficient than the floating point format.

4. Compare and contrast the BCD format to the floating point format in terms of:

a. precision

b. performance in calculations

c. memory usage

5. Select the format (floating point format, binary coded decimal (BCD), or exponential format) that you would recommend for processing efficiency and describe why.

6. Floating point numbers can introduce rounding errors in the banking industry, which may lead to financial benefit for the bank but not for the customer. Analyze the ethics of knowingly benefitting from rounding errors. Propose a plan on how the rounding error should be handled.

7. Differentiate between the exponential format and the floating point format in terms of:

a. format

b. processing speed

c. accuracy

8. Use at least three quality resources in this assignment.

Assignment must follow these formatting requirements:

i) Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

ii) Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

i) Summarize CPU data types and common data structures.

ii) Develop an enterprise architecture plan to address and solve a proposed business ethical problem.

iii) Use technology and information resources to research issues in enterprise architecture.

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M95836

Have any Question?

## Related Questions in Computer Engineering

### Assignmenthvm wants to keep a list of their customers the

Assignment HVM wants to keep a list of their customers. The information they store for each customer is their name, a customer identification number, their address, phone number, what boat number they own (which will cor ...

### 1 a grab bag adt is similar to the bag adt with one

1. A Grab Bag ADT is similar to the Bag ADT with one difference. A grab bag does not have a remove() operation, but in place of it has a grabItem() operation, which allows for the random removal of an item from the bag. ...

### The following training set is lineraly separabletrain by

The following training set is lineraly separable: Train (by hand) a linear threshold element on this training set. Your unit will have four inputs counting the one that implements the threshold. Assume that the initial v ...

### The stream cipher described in definition 211 can easily be

The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For manual encryption, an especially useful one is a stream cipher that operates on letters. 1. De ...

### 1 the development of a forensic lab for computers and

1. The development of a forensic lab for computers and mobile devices involves numerous specialized tools. Describe both hardware and software tools that might be utilized in such a lab. 2. Select ONE type of software to ...

### 1 what are kerberos authentication path how do they solve

1. What are Kerberos authentication path? How do they solve the problem of remote authentication? 2. The Kerberos system has several bugs that pose potential security risks. Study the Kerberos ticketing service and discu ...

### Algorithim tasksthis assignment involves creating an

Algorithim / Tasks This assignment involves creating an algorithm. An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem. We will see in future weeks how the detailed steps of this type ...

### Design and implement an algorithm that accepts as input an

Design and implement an algorithm that accepts as input an ordered list of search names. The task required is to establish and report the absence or presence of these search names in a second much longer ordered list.

### 1 when we say that the transport layer multiplexes and

1. When we say that the transport layer multiplexes and demultiplexes applicationlayer messages, do we mean that a transport-layer protocol can combine several messages from the application layer in one packet? Explain. ...

### Annuity payment jeremy is saving money to open an indoor

Annuity Payment: Jeremy is saving money to open an indoor skate board park. He needs \$10,000 in three years to purchase equipment and initiate a building lease. He's investing his savings in an annuity yielding an annual ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro