Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) describe the implementation of stack in software. Describe its operation with an ex.

b) Briefly discuss the different types of opcode encoding. In a computer instruction format the instruction length and size of an address field are 11 and 4 bits respectively. Is it possible to have?

7 two address instructions
15 one address instructions
18 zero address instructions

using expanding opcode technique. Justify your answer.

c) What do you understand by the following addressing modes?

i) inherent

ii) absolute

iii) register

iv) register indirect

d) Represent the following numbers in 32 bit floating point format.

i) -1/32

ii) 1/8

iii) -0.625

iv) 5

problem 2)a) Describe hardware implementation of unsigned binary multiplication with block diagram and flow chart. Also describe the operation with an ex.

b) Multiply the following using Booth’s algorithm.

i) 7*3

ii) 4*(-6)

iii) -5*(-3)

iv) -2*7

c) Design a 4 bit general purpose register with the following functions:

S1  S2  Function
 0   0    Load external data
 0   1    Arithmetic shift right
 1   0    Rotate right
 1   1    Rotate left

Describe the internal organization of the basic cell used in this design

problem 3)a) Design and implement a combinational circuit that will work as follows:

S1  S2  Function
 0   0    A plus B
 0   1    Shift left A
 1   0    A plus B plus 1
 1   1    Shift left A plus 1

A and B are 4 bit operands.

b) Draw a neat block diagram schematic of the AM 2901 Bit Slice Processor.

c) Describe the design of a microprogrammed control unit for 4X4 Booth’s multiplier. find out the sizes of the CMDB and CM and obtain the complete hardware organization of the microprogrammed multiplier control unit.

problem 4) Design a hardwired control unit to find nth Fibonacci term. Assume n<=8. Design the control unit using counter decoder and PLA.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96533

Have any Question? 


Related Questions in Computer Engineering

1 what are the source and destination ip addresses in a

1. What are the source and destination IP addresses in a datagram that carries the ICMPv4 message reported by a router? 2. Explain why the registration request and reply are not directly encapsulated in an IP datagram. W ...

Develop a flash share movieoverviewyour final project in

Develop a Flash share movie OVERVIEW Your final project in this class is required to be more extensive than the weekly lab projects. Your project should demonstrate a significant application of technical elements and als ...

Powerpoint presentationnote the accepted microsoft office

PowerPoint Presentation Note: The accepted Microsoft Office versions for this assignment are Microsoft Office 2013 (for PC) and Microsoft Office for Mac 2011 (for Macintosh). Students may use a more recent version if ava ...

Compute-intensive communicating processes which transfer a

Compute-intensive communicating processes. which transfer a total of 100 characters during their operation. Assume that the time-sharing system time-slices between these processes with a 1-S quantum; that is, an alarm-cl ...

Task descriptionproject animationusing adobe after effects

TASK DESCRIPTION Project: Animation Using Adobe After Effects students are to create an animation. LEARNING OUTCOMES - Produce documents and present work in multimedia formats appropriate for the intended audience. - App ...

Consider a finite tree of depth d and branching factor b a

Consider a finite tree of depth d and branching factor b. (A tree consisting of only a root node has depth zero; a tree consisting of a root node and its It successors has depth 1; etc.) Suppose the shallowest goal node ...

Keeping the iv secret in ofb mode does not make an

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext Descri ...

Sql research paperwrite a 4 page technical paper about the

SQL Research Paper Write a 4 page technical paper about the following topic: Topic : NOSQL as a mechanism for storage and retrieval of data. Your paper may include any or some of the following themes: • It must have a te ...

1 what is physical security what are the primary threats to

1. What is physical security? What are the primary threats to physical security? How are they made manifest in attacks against the organization? 2. What are the roles of IT, security, and general management with regard t ...

1 how does a signature-based idps differ from a

1. How does a signature-based IDPS differ from a behavior-based IDPS? 2. What is a monitoring (or SPAN) port? What is it used for? 3. List and describe the three control strategies proposed for IDPS control.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro