Ask Question, Ask an Expert


Ask Computer Engineering Expert

1. Construct a truth table for the following Boolean expressions:

a) ABC + A’B’C’

b) ABC + AB’C’ + A’B’C’

c) A(BC’ + B’C)

2. Simplify the following expressions:

a) A•B’ + B’•A + C•D•E + C’•D•E + E•C’•D

b) A•B + A•C + B•A

3. Apply DeMorgan’s theorem to the following expressions:

a) F = (V + A + L)‾

b) F = A’ + B’ + C’ + D’

4. How many input and output lines does a multiplexer contain if it has four select lines? Justify your answer.

5. How many output lines does a decoder contain if it has 10 input lines? Justify your answer.

6. Design a 4-to-1 multiplexer using AND, OR, and NOT gates. HINT: construct a truth table for this multiplexer using a maximum of a 2-bit combinations.

7. Convert 0010 11012 to hexadecimal.

8. What ASCII character is 0110 11012?

9. Two’s complement is a method of representing positive and negative integers in binary. Provide the 8-bit two’s complement representation of +67 and -67. Your answers should be 8 bits long.

10. Carry out the indicated base conversions:

a) 548 to base 5

b) 3124 to base 7

c) 5206 to base 7

d) 122123 to base 9

11. If processor A has the higher clock rate than processor B, and processor A also has the higher MIPS rating than processor B, describe whether processor A would always execute faster than processor B. Assume that there are two implementations of same instruction set architecture. Machine A has the clock cycle time of 20ns and the effective CPI of 1.5 for some program, and machine B has the clock cycle time of 15ns and an effective CPI of 1.0 for the same program. Which machine is faster for this program, and by how much?

12. What does this circuit do?


Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92059

Have any Question? 

Related Questions in Computer Engineering

1 write a program to read a list of grade point averages 00

1. Write a program to read a list of grade point averages (0.0 - 4.0) from a text file and sort them in descending order. Select the most efficient sorting algorithm for your program. 2. Some algorithms are too complex t ...

1 a network consists of n hosts assuming that cryptographic

1. A network consists of n hosts. Assuming that cryptographic keys are distributed on a per-hostpair basis, compute how many different keys are required. 2. One cryptographic checksum is computed by applying the DES in C ...

1 authentication using certi fi cates although considered

1. Authentication using certi fi cates, although considered safe, suffers from weaknesses. Discuss these weaknesses using speci fi c examples. 2. Kerberos and SSL are additional layers to enhance authentication. Detail h ...

Hands-on project - honeybothoneybot is a simple honeypot

Hands-On Project - HoneyBOT HoneyBOT is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to te ...

Based on the design requirements and decisions that have

Based on the design requirements and decisions that have been made, what wireless access points would you recommend for WVCC? Do some Internet research to find an access point that will meet WVCC's needs and write two or ...

Repeat exercise p87 using multiple classes modify the

Repeat Exercise P8.7, using multiple classes. Modify the GradeBook class so that it collects objects of type Student. Each such object should have a list of scores. Exercise P8.7 Modify the grade book application of How ...

1 run the binary search method on a set of unordered data

1. Run the binary search method on a set of unordered data. What happens? 2. Using the CArray class with the SeqSearch method and the BinSearch method, create an array of 1,000 random integers. Add a new private Integer ...

Assignment questions -question 1 read the scenario in

Assignment Questions - Question 1: Read the scenario in Appendix 1 (Pickerings Properties). (a) List the functions of the system, as perceived by an external user. (b) List the external entities. Note that because we are ...

For the following we assume aes with 192-bit key length

For the following, we assume AES with 192-bit key length. Furthermore, let us assume an ASIC which can check 3 · 107 keys per second. 1. If we use 100,000 such ICs in parallel, how long does an average key search take? C ...

The cost to become a member of a fitness center is as

The cost to become a member of a fitness center is as follows: The senior citizens discount is 30% If the membership is bought and paid for 12 or more months, the discount is 15% If more than five personal training sessi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro