Fill in the following table to show how the given integers are represented, assuming that 16 bits are used to store values and the machine uses two’s complement notation.IntegerBinaryHex4-Byte Big Endian (Hex value as seen in memory)4-Byte Little Endian (Hex value as seen in memory)28    2216    −18675    −12    31456

Question
Asked May 1, 2019
521 views

Fill in the following table to show how the given integers are represented, assuming that 16 bits are used to store values and the machine uses two’s complement notation.

Integer Binary Hex 4-Byte Big Endian (Hex value as seen in memory) 4-Byte Little Endian (Hex value as seen in memory)
28        
2216        
−18675        
−12        
31456      
check_circle

Expert Answer

Step 1

Convert the integer value to binary:

For positive integer:

Divide the integer number by 2. The integer quotient obtained is for the next iteration, and the remainder is for the binary digit. Repeat these steps until the quotient becomes 0.

For negative integer:

Convert the integer number into binary using the above-mentioned steps. Flip all the bits of the resulting binary number and add 1 to the flipped binary number to get signed binary number using 2’s complement.

Convert the integer value to Hex:

Take the binary number obtained in the previous steps. Starting from least significant bit take binary digi...

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*

See Solution
*Response times may vary by subject and question.
Tagged in

Engineering

Computer Science

Related Computer Science Q&A

Find answers to questions asked by student like you
Show more Q&A
add
question_answer

Q: How do I read a sequence of values in a file into a arraylist in a method? It's in java progarmming.

A: We need to use Scanner calss. In which java.util package used for obtaining the input of the primiti...

question_answer

Q: 11,12,13

A: Two main advantages of storing data digitally rather than in analog format are:Data stored in digita...

question_answer

Q: The nor of two languages is nor (L1, L2) = {w : w ∉ L1 and w ∉ L2}. Show that the family of regular ...

A: Click to see the answer

question_answer

Q: Write a program in c++ to generate a random number between 1 - 100, and then display which quartile ...

A: Program plan:Include the required header files into the program.Define the main function.Declare the...

question_answer

Q: Write a Python program that allows the user to enter any integer value, and displays the value of 2 ...

A: Given below is the python program that allows the user to enter the value of an integer and displays...

question_answer

Q: Consider the following grammar in BNF (start symbol is ) Which of the following sentences are in the...

A: Backus-Naur Form (BNF):BNF is a formal mathematical method to define the syntax of the programming l...

question_answer

Q: What type of data breach occurred involving the Facebook/Cambridge Analytica?

A: Data breaching involves intentional or unintentional leakage of confidential information to un autho...

question_answer

Q: When working with database entity relationship modeling, should the cardinality between entities be ...

A: Cardinality: The maximum or minimum number of elements allowed on each side of the relationship in t...

question_answer

Q: When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at leas...

A: Reason of formatting the disks or hard drives is as follows: