Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) describe the implementation of stack in software. Describe its operation with an ex.

b) Briefly discuss the different types of opcode encoding. In a computer instruction format the instruction length and size of an address field are 11 and 4 bits respectively. Is it possible to have?

7 two address instructions
15 one address instructions
18 zero address instructions

using expanding opcode technique. Justify your answer.

c) What do you understand by the following addressing modes?

i) inherent

ii) absolute

iii) register

iv) register indirect

d) Represent the following numbers in 32 bit floating point format.

i) -1/32

ii) 1/8

iii) -0.625

iv) 5

problem 2)a) Describe hardware implementation of unsigned binary multiplication with block diagram and flow chart. Also describe the operation with an ex.

b) Multiply the following using Booth’s algorithm.

i) 7*3

ii) 4*(-6)

iii) -5*(-3)

iv) -2*7

c) Design a 4 bit general purpose register with the following functions:

S1  S2  Function
 0   0    Load external data
 0   1    Arithmetic shift right
 1   0    Rotate right
 1   1    Rotate left

Describe the internal organization of the basic cell used in this design

problem 3)a) Design and implement a combinational circuit that will work as follows:

S1  S2  Function
 0   0    A plus B
 0   1    Shift left A
 1   0    A plus B plus 1
 1   1    Shift left A plus 1

A and B are 4 bit operands.

b) Draw a neat block diagram schematic of the AM 2901 Bit Slice Processor.

c) Describe the design of a microprogrammed control unit for 4X4 Booth’s multiplier. find out the sizes of the CMDB and CM and obtain the complete hardware organization of the microprogrammed multiplier control unit.

problem 4) Design a hardwired control unit to find nth Fibonacci term. Assume n<=8. Design the control unit using counter decoder and PLA.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96533

Have any Question? 

Related Questions in Computer Engineering

In a typical vector adt the size of the underlying array

In a typical Vector ADT, the size of the underlying array decreases after a sufficient number of items have been removed. Devise a strategy for decreasing the size of the array as items are removed. Modify your implement ...

A program is to perform two products one is a vector

A program is to perform two products: one is a vector product of two 100-element vectors and the other is the product produced by multiplying the corresponding elements of a 1000 by 1000 element matrix by a scalar consta ...

A noted computer security expert has said that without

A noted computer security expert has said that without integrity, no system can provide confidentiality. a. Do you agree? Justify your answer. b. Can a system provide integrity without confidentiality? Again, justify you ...

1 what is a negative feedback loop how is it used to keep a

1. What is a negative feedback loop? How is it used to keep a project in control? 2. When a task is not being completed according to the plan, what two circumstances are likely to be involved?

Microsoft word - tutorialdocthe pharmacy at mercy hospital

Microsoft Word - Tutorial.doc The pharmacy at Mercy Hospital fills medical prescriptions for all patients and distributes these medications to the nurse stations responsible for the patient's care. Medical prescriptions ...

Blackjack twenty-one is a casino game played with cards the

Blackjack (twenty-one) is a casino game played with cards. The goal of the game is to draw cards that total as close to 21 points as possible without going over. All face cards count as 10 points, aces count as 1 or 11, ...

1 if the processor has forwarding but we forgot to

1. If the processor has forwarding, but we forgot to implement the hazard detection unit, what happens when this code executes? 2. If there is forwarding, for the first five cycles during the execution of this code, spec ...

Define scope schedule cost and customer satisfaction why

Define scope, schedule, cost and customer satisfaction. Why are these considered to be constraints? Answer in 4-5 sentences.

1 at any moment a rip message may arrive at a router that

1. At any moment, a RIP message may arrive at a router that runs RIP as the routing protocol. Does it mean that the RIP process should be running all the time? 2. Why do you think RIP uses UDP instead of TCP? 3. We say t ...

1 why is it important to use specific and clearly defined

1. Why is it important to use specific and clearly defined job descriptions for hiring information security professionals? 2. What functions does the CISO perform, and what are the key qualifications and requirements for ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro