Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Construct a truth table for the following Boolean expressions:

a) ABC + A’B’C’

b) ABC + AB’C’ + A’B’C’

c) A(BC’ + B’C)

2. Simplify the following expressions:

a) A•B’ + B’•A + C•D•E + C’•D•E + E•C’•D

b) A•B + A•C + B•A

3. Apply DeMorgan’s theorem to the following expressions:

a) F = (V + A + L)‾

b) F = A’ + B’ + C’ + D’

4. How many input and output lines does a multiplexer contain if it has four select lines? Justify your answer.

5. How many output lines does a decoder contain if it has 10 input lines? Justify your answer.

6. Design a 4-to-1 multiplexer using AND, OR, and NOT gates. HINT: construct a truth table for this multiplexer using a maximum of a 2-bit combinations.

7. Convert 0010 11012 to hexadecimal.

8. What ASCII character is 0110 11012?

9. Two’s complement is a method of representing positive and negative integers in binary. Provide the 8-bit two’s complement representation of +67 and -67. Your answers should be 8 bits long.

10. Carry out the indicated base conversions:

a) 548 to base 5

b) 3124 to base 7

c) 5206 to base 7

d) 122123 to base 9

11. If processor A has the higher clock rate than processor B, and processor A also has the higher MIPS rating than processor B, describe whether processor A would always execute faster than processor B. Assume that there are two implementations of same instruction set architecture. Machine A has the clock cycle time of 20ns and the effective CPI of 1.5 for some program, and machine B has the clock cycle time of 15ns and an effective CPI of 1.0 for the same program. Which machine is faster for this program, and by how much?

12. What does this circuit do?

475_Circuit.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92059

Have any Question? 


Related Questions in Computer Engineering

1 write a regular expression that finds all the words in a

1. Write a regular expression that finds all the words in a string that contain double letters, such as "deep" and "book". 2. Write a regular expression that finds all the header tags (, , etc.) in a Web page. 3. Write a ...

1 assume an object identifier in mib has three simple

1. Assume an object identifier in MIB has three simple variables. If the object identifier is x, what is the identifier of each variable? 2. Can SNMP reference the entire row of a table? In other words, can SNMP retrieve ...

1 during 2003 we began to stop worrying that inflation was

1. During 2003, we began to stop worrying that inflation was a problem. Instead, we began to worry about deflation, a decline in the price level. Assume that the Fed decided to hold the money supply constant. What impact ...

Identify a major information security incident that has

Identify a major information security incident that has occurred in the recent past (within the last five years).  If possible, identify a breach that occurred in, or otherwise impacted, the Middle East.  Review and anal ...

1 what is the difference between law and ethics2 what is

1. What is the difference between law and ethics? 2. What is civil law, and what does it accomplish? 3. What are the primary examples of public law? 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what ...

Create a foreign agent advertisement message using 1672 as

Create a foreign agent advertisement message using 1672 as the sequence number and a lifetime of 4 hours. Select your own values for the bits in the code field. Use at least three care-of addresses of your choice. Calcul ...

Write a program that reads in the hourly wage of an

Write a program that reads in the hourly wage of an employee. Then ask how many hours the employee worked in the past week. Be sure to accept fractional hours. Compute the pay. Any overtime work (over 40 hours per week) ...

1 a source socket address is a combination of an ip address

1. A source socket address is a combination of an IP address and a port number. Explain what each section identifies. 2. Explain how a client process finds the IP address and the port number to be inserted in a remote so ...

Develop a recursive implementation that incorporates the

Develop a recursive implementation that incorporates the ideas above for calculating the Fibonacci number. Compare the performance of the recursive method with the iterative solution.

1 prove that any file in the dgux system with a link count

1. Prove that any file in the DG/UX system with a link count greater than 1 must have an explicit MAC label. 2. In the DG/UX system, why is the virus prevention region below the user region? 3. In the DG/UX system, why i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro