Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Construct a truth table for the following Boolean expressions:

a) ABC + A’B’C’

b) ABC + AB’C’ + A’B’C’

c) A(BC’ + B’C)

2. Simplify the following expressions:

a) A•B’ + B’•A + C•D•E + C’•D•E + E•C’•D

b) A•B + A•C + B•A

3. Apply DeMorgan’s theorem to the following expressions:

a) F = (V + A + L)‾

b) F = A’ + B’ + C’ + D’

4. How many input and output lines does a multiplexer contain if it has four select lines? Justify your answer.

5. How many output lines does a decoder contain if it has 10 input lines? Justify your answer.

6. Design a 4-to-1 multiplexer using AND, OR, and NOT gates. HINT: construct a truth table for this multiplexer using a maximum of a 2-bit combinations.

7. Convert 0010 11012 to hexadecimal.

8. What ASCII character is 0110 11012?

9. Two’s complement is a method of representing positive and negative integers in binary. Provide the 8-bit two’s complement representation of +67 and -67. Your answers should be 8 bits long.

10. Carry out the indicated base conversions:

a) 548 to base 5

b) 3124 to base 7

c) 5206 to base 7

d) 122123 to base 9

11. If processor A has the higher clock rate than processor B, and processor A also has the higher MIPS rating than processor B, describe whether processor A would always execute faster than processor B. Assume that there are two implementations of same instruction set architecture. Machine A has the clock cycle time of 20ns and the effective CPI of 1.5 for some program, and machine B has the clock cycle time of 15ns and an effective CPI of 1.0 for the same program. Which machine is faster for this program, and by how much?

12. What does this circuit do?

475_Circuit.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92059

Have any Question? 


Related Questions in Computer Engineering

A read hit occurs in way2 of set 17 within an 8-way set

A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 with ...

1 how do you discover syntax errors how do you discover

1. How do you discover syntax errors? How do you discover logic errors? 2. Write three versions of the HelloPrinter.java program that have different compile-time errors. Write a version that has a run-time error.

1 what are cryptography and cryptanalysis2 what were some

1. What are cryptography and cryptanalysis? 2. What were some of the first uses of cryptography? 3. What is a key, and what is it used for? 4. What are the three basic operations in cryptography?

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

Given is the same curve as in 97 the order of this curve is

Given is the same curve as in 9.7. The order of this curve is known to be #E = 37. Furthermore, an additional point Q = 15 · P = (14,23) on this curve is given. Determine the result of the following point multiplications ...

1 how many point-to-point wans are needed to connect n lans

1. How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN? 2. When we use local telephones to talk to a friend, are we using a circuitswitched netw ...

1 assume an object identifier in mib has three simple

1. Assume an object identifier in MIB has three simple variables. If the object identifier is x, what is the identifier of each variable? 2. Can SNMP reference the entire row of a table? In other words, can SNMP retrieve ...

A searching method that uses linear interpolation can give

A searching method that uses linear interpolation can give fast retrieval when the ordered data set is relatively evenly distributed over its range of possible values. With this method. the magnitude of the value x we ar ...

Explain why it is important for the safety professional to

Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts. Your response must be at least 75 words in length.

An arithmetic expression can be stored in a binary search

An arithmetic expression can be stored in a binary search tree. Modify the BinarySearchTree class so that an expression such as 2 + 3 ∗ 4/5 can be properly evaluated using the correct operator precedence rules.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen