Quiz submission record for quiz3-2-1 at Wed Jul 7 01:41:53 2004: Your Answer for Question 1: Someone could exploit this by getting the machine code and then figuring out what the stored data is such as passwords, PINs, etc. One technique is encryption, but the tradeoff is simplicity. encryption would make everything almost undecipherable. Your Answer for Question 2: Subnormals are numbers that are not normalized, that is, They have the same exponent as zero but a nonzero significand. It is important because it allows us to do gradual underflow, which causes the number to degrade until it becomes 0. Your Answer for Question 3: Programmers did this to compensate for the lack of a guard digit in double precision. Your Answer for Question 4: strong arguments for the use of IEEE 754 is that it is a widely implemented standard. It also requires minimum accuracy.Arguments against it that it lacks compiler support. Your unique submission ID is quiz3-2-1-cs61c-as-1089189713-1797.