Computer Systems: A Programmer's Perspective (3rd Edition)
Computer Systems: A Programmer's Perspective (3rd Edition)
3rd Edition
ISBN: 9780134092669
Author: Bryant, Randal E. Bryant, David R. O'Hallaron, David R., Randal E.; O'Hallaron, Bryant/O'hallaron
Publisher: PEARSON
bartleby

Videos

Question
Book Icon
Chapter 2, Problem 2.55HW
Expert Solution & Answer
Check Mark
Program Plan Intro

Byte ordering:

  • Some machines decide to store the objects in memory ordered from least significant byte to most, while other machines store them from most to least.
  • The byte ordering are made by the two ways:
    • Little Endian
      • In little Endian, the least significant byte comes first.
    • Big Endian
      • In big Endian, the most significant byte comes first.

Example:

The example for find the little-endian and big-endian for hexadecimal value is shown below:

Here assume that the hexadecimal value is “0x13244860”. Then address range for given ordering byte is “0x200” through “0x203”.

Big Endian for given hexadecimal value is

0x2000x2010x2020x203
13244860

Little Endian for given hexadecimal value is

0x2000x2010x2020x203
60482413

Explanation of Solution

Corresponding code from given question:

#include <stdio.h>

//Define variable "byte_pointer" in char datatype.

typedef unsigned char* byte_pointer;

//Function definition for show_bytes.

void show_bytes(byte_pointer start, size_t len)

{

//Declare variable "i" in int data type.

int i;

/* "For" loop to determine byte representation in hexadecimal */

for (i = 0; i < len; i++)

//Display each bytes in "2" digits hexadecimal value.

printf(" %.2x", start[i]);

printf("\n");

}

//Function to determine byte for "int" number.

void show_int(int x)

{

//Call show_bytes function with integer value.

show_bytes((byte_pointer) &x, sizeof(int));

}

//Function to determine byte for "float" number.

void show_float(float x)

{

//Call show_bytes function float value.

show_bytes((byte_pointer) &x, sizeof(float));

}

//Function to determine byte for "pointer" number.

void show_pointer(void *x)

{

//Call show_bytes function with pointer value.

show_bytes((byte_pointer) &x, sizeof(void *));

}

//Test all show bytes.

void test_show_bytes(int val)

{

//Define variables.

int ival = val;

float fval = (float) ival;

int *pval = &ival;

//Call function.

show_int(ival);

show_float(fval);

show_pointer(pval);

}

//Main function.

int main(int argc, char* argv[])

{

//Define the sample number.

int sampleNumber = 682402;

//Call test_show_bytes function.

test_show_bytes(sampleNumber);

return 0;

}

The given program is used to display the byte representation of different program objects by using the casting.

  • Define “byte_pointer” using “typedef”.
    • It is used to define data type as a pointer to an object of type “unsigned char”.
  • The function “show_bytes” is used to display the address of a byte sequence by using the argument that is byte pointer and a byte count.
    • Each byte is displayed by “2” digit.
  • The function “show_int” is to display the byte representations of object of “int” data type.
  • The function “show_float” is to display the byte representations of object of “float” data type.
  • The function “show_pointer” is to display the byte representations of object of “void *” data type.
  • Test all the data type values by using function “test_show_bytes”.
  • Finally, assign the sample number in main function and call the “test_show_bytes” with argument “sampleNumber”.

Byte ordering used by the given machines:

After compiling and running the above code, the following output will be appear

a2 69 0a 00

20 9a 26 49

3c cc e9 18 ff 7f 00 00

From the above output,

  • The byte representation for “int” data type is “a2 69 0a 00”.
  • The byte representation for “float” data type is “20 9a 26 49”.
  • The byte representation for “int *”data type is “3c cc e9 18 ff 7f 00 00”.

The byte ordering used by these machines is “big-endian”.

  • Reason:
    • Consider, the byte representation of “int” value is “a2 69 0a 00”.
    • From this, the value is ordered from most significant byte to least significant byte. Hence, it is referred as big-endian.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Answer all of the questions with steps by step explanation to every question.
W Go Tools Window Help mac283_quiz3_fall2025.pdf Page 2 of 2 @ Q Q Û • ¨ ® - Qy Search X 00 01 11 10 0 1 1 1 0 1 1 1 1 1 A ABC 88% Problem 3. Draw the combinational circuit that directly implements the Boolean expression: F(x, y, z) = xyz + (y²+z) Problem 4. Find the truth table that describes the following circuit. y- z - X Problem 5. a) Describe how a decoder works and indicate typical inputs and outputs. b) How many inputs does a decoder have if it has 64 outputs? NOV 6 M tv♫ zoom
CPS 2390 Extra Credit Assignment For each problem, choose the best answer and explain how you arrived at your answer. (15 points each.) 1.If control is redirected to location x4444 after the execution of the following instructions, what should have been the relationship between R1 and R2 before these instructions were executed? Address Instruction x4400 1001100010111111 x4401 0001100100100001 x4402 0001100001000100 x4403 0000100001000000 A. R1 R2 (R1 was greater than R2) B. R1 R2 (R2 was greater than R1) C. R1 R2 (R1 and R2 were equal) = D. Cannot be determined with the given information. 2. If the value stored in RO is 5 at the end of the execution of the following instructions, what can be inferred about R5? Address x3000 Instruction 0101000000100000 x3001 0101111111100000 x3002 0001110111100001 x3003 0101100101000110 x3004 0000010000000001 x3005 0001000000100001 x3006 0001110110000110 x3007 0001111111100001 x3008 0001001111111000 x3009 0000100111111000 x300A 0101111111100000 A. The…

Chapter 2 Solutions

Computer Systems: A Programmer's Perspective (3rd Edition)

Chapter 2.1, Problem 2.11PPChapter 2.1, Problem 2.12PPChapter 2.1, Problem 2.13PPChapter 2.1, Problem 2.14PPChapter 2.1, Problem 2.15PPChapter 2.1, Problem 2.16PPChapter 2.2, Problem 2.17PPChapter 2.2, Problem 2.18PPChapter 2.2, Problem 2.19PPChapter 2.2, Problem 2.20PPChapter 2.2, Problem 2.21PPChapter 2.2, Problem 2.22PPChapter 2.2, Problem 2.23PPChapter 2.2, Problem 2.24PPChapter 2.2, Problem 2.25PPChapter 2.2, Problem 2.26PPChapter 2.3, Problem 2.27PPChapter 2.3, Problem 2.28PPChapter 2.3, Problem 2.29PPChapter 2.3, Problem 2.30PPChapter 2.3, Problem 2.31PPChapter 2.3, Problem 2.32PPChapter 2.3, Problem 2.33PPChapter 2.3, Problem 2.34PPChapter 2.3, Problem 2.35PPChapter 2.3, Problem 2.36PPChapter 2.3, Problem 2.37PPChapter 2.3, Problem 2.38PPChapter 2.3, Problem 2.39PPChapter 2.3, Problem 2.40PPChapter 2.3, Problem 2.41PPChapter 2.3, Problem 2.42PPChapter 2.3, Problem 2.43PPChapter 2.3, Problem 2.44PPChapter 2.4, Problem 2.45PPChapter 2.4, Problem 2.46PPChapter 2.4, Problem 2.47PPChapter 2.4, Problem 2.48PPChapter 2.4, Problem 2.49PPChapter 2.4, Problem 2.50PPChapter 2.4, Problem 2.51PPChapter 2.4, Problem 2.52PPChapter 2.4, Problem 2.53PPChapter 2.4, Problem 2.54PPChapter 2, Problem 2.55HWChapter 2, Problem 2.56HWChapter 2, Problem 2.57HWChapter 2, Problem 2.58HWChapter 2, Problem 2.59HWChapter 2, Problem 2.60HWChapter 2, Problem 2.61HWChapter 2, Problem 2.62HWChapter 2, Problem 2.63HWChapter 2, Problem 2.64HWChapter 2, Problem 2.65HWChapter 2, Problem 2.66HWChapter 2, Problem 2.67HWChapter 2, Problem 2.68HWChapter 2, Problem 2.69HWChapter 2, Problem 2.70HWChapter 2, Problem 2.71HWChapter 2, Problem 2.72HWChapter 2, Problem 2.73HWChapter 2, Problem 2.74HWChapter 2, Problem 2.75HWChapter 2, Problem 2.76HWChapter 2, Problem 2.77HWChapter 2, Problem 2.78HWChapter 2, Problem 2.79HWChapter 2, Problem 2.80HWChapter 2, Problem 2.81HWChapter 2, Problem 2.82HWChapter 2, Problem 2.83HWChapter 2, Problem 2.84HWChapter 2, Problem 2.85HWChapter 2, Problem 2.86HWChapter 2, Problem 2.87HWChapter 2, Problem 2.88HWChapter 2, Problem 2.89HWChapter 2, Problem 2.90HWChapter 2, Problem 2.91HWChapter 2, Problem 2.92HWChapter 2, Problem 2.93HWChapter 2, Problem 2.94HWChapter 2, Problem 2.95HWChapter 2, Problem 2.96HWChapter 2, Problem 2.97HW

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
What Are Data Types?; Author: Jabrils;https://www.youtube.com/watch?v=A37-3lflh8I;License: Standard YouTube License, CC-BY
Data Types; Author: CS50;https://www.youtube.com/watch?v=Fc9htmvVZ9U;License: Standard Youtube License