Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Construct a truth table for the following Boolean expressions:

a) ABC + A’B’C’

b) ABC + AB’C’ + A’B’C’

c) A(BC’ + B’C)

2. Simplify the following expressions:

a) A•B’ + B’•A + C•D•E + C’•D•E + E•C’•D

b) A•B + A•C + B•A

3. Apply DeMorgan’s theorem to the following expressions:

a) F = (V + A + L)‾

b) F = A’ + B’ + C’ + D’

4. How many input and output lines does a multiplexer contain if it has four select lines? Justify your answer.

5. How many output lines does a decoder contain if it has 10 input lines? Justify your answer.

6. Design a 4-to-1 multiplexer using AND, OR, and NOT gates. HINT: construct a truth table for this multiplexer using a maximum of a 2-bit combinations.

7. Convert 0010 11012 to hexadecimal.

8. What ASCII character is 0110 11012?

9. Two’s complement is a method of representing positive and negative integers in binary. Provide the 8-bit two’s complement representation of +67 and -67. Your answers should be 8 bits long.

10. Carry out the indicated base conversions:

a) 548 to base 5

b) 3124 to base 7

c) 5206 to base 7

d) 122123 to base 9

11. If processor A has the higher clock rate than processor B, and processor A also has the higher MIPS rating than processor B, describe whether processor A would always execute faster than processor B. Assume that there are two implementations of same instruction set architecture. Machine A has the clock cycle time of 20ns and the effective CPI of 1.5 for some program, and machine B has the clock cycle time of 15ns and an effective CPI of 1.0 for the same program. Which machine is faster for this program, and by how much?

12. What does this circuit do?

475_Circuit.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92059

Have any Question? 


Related Questions in Computer Engineering

Consider a finite tree of depth d and branching factor b a

Consider a finite tree of depth d and branching factor b. (A tree consisting of only a root node has depth zero; a tree consisting of a root node and its It successors has depth 1; etc.) Suppose the shallowest goal node ...

1 how would you use a random number generator to simulate

1. How would you use a random number generator to simulate the drawing of a playing card? 2. What is an "off-by-one error"? Give an example from your own programming experience. 3. Give an example of a for loop in which ...

What are the source and destination port numbers when an

What are the source and destination port numbers when an SNMP message carries one of the following PDUs? a. GetRequest b. Response c. Trap d. Report

While working with ms dos which command will you use to

While working with Ms Dos, which command will you use to transfer a specific file from one disk to another?

Discuss the role of efficiency and effectiveness in the

Discuss the role of efficiency and effectiveness in the creation of value.

A program contains a sequential part and the remaining part

A program contains a sequential part and the remaining part can be split evenly into independent tasks that can execute in parallel on the 16 available cores in the system. If a speedup of 15 is to be achieved using all ...

Homework1 determining the format of the number to be

HOMEWORK 1) Determining the format of the number to be entered first (binary, decimal and hexadecimal) This should be done using the CheckBoxes found in the interface. - Access to the other two text boxes outside the rel ...

The problem of the dutch national flag involves starting

The problem of the Dutch national flag involves starting out with a row of n buckets, i.e. bucket [1..n], each bucket containing a single pebble that is either red, white or blue. The task is to arrange the pebbles so th ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does HTTP have any ...

Secure encrypted communicationstransmitting personal and

Secure Encrypted Communications Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro