Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1)

(a) Do following arithmetic operations by using binary signed 2’s complement notation for integers. You might suppose that maximum size of integers is of 10 bits including sign bit. (Note that the numbers given here are in decimal notation)                

i) Add – 512  and 198

ii) Subtract 400 from  –98

iii) Add 400 and 112

Please indicate overflow if occurs.

(b) Convert hexadecimal number: 21 3A FE  into binary, octal and decimal equivalent.   

(c) Convert following string into equivalent “UTF 16” code –

     “Email addresses always use @ sign”.
    Are these codes same as that used in ASCII?                                  

(d) Design two logic circuits. First circuit takes 3 bit input and produces an odd parity bit output of three input bits. Second circuit takes three bit input and parity bit (which is produced as output of circuit 1) and outputs 0 if the odd parity is satisfied, else it outputs 1. Draw truth tables and use K-map to design Boolean expressions for each of the output bits. Draw resulting circuit diagram by using AND – OR – NOT gates.                  

(e) Design two bit counter (a sequential circuit) which counts as 0, 1, 2, 0, 1, 2... and so on. You must draw state table, state diagram, the k-map for circuit design, logic diagram of the resultant design using D flip-flop.                            

(f) Design floating point representation of size 24 bits closer to IEEE 754 format. Number should have a 7 bit biased exponent having a bias of 64. You might suppose that mantissa is in normalised form with first bit being the sign bit of mantissa. Represent the number (34.125) 10 using this format    .                                      

problem2)

(a) A RAM has a capacity of 256K × 8.

(i) How many data input and output lines does this RAM required? Describe your answer.

(ii) How many address lines would be required for this RAM? Describe.

(b) A computer have 1024 words RAM with word size of 16 bits and a cache memory of 16 Blocks with block size of 32 bits draw a diagram to demonstrate the address mapping of RAM and Cache, if  (i) direct cache mapping is used, and (ii) the two way set associative memory to cache mapping scheme is used.          

(c) Compare different Input/output techniques which are used in a general purpose computer. Which I/O technique would be used for each of the following situation? Give justification in support of your answer.   

(i) Data input to a chat server

(ii) Copying the data from one disk file to another disk file                  

(d) Define different terms relating to access of a Magnetic disk. Determine the average disk access time which reads or prepares to a 2048 byte sector. Suppose that the disk rotates at 3000 rpm; each track of the disk has 16 sectors and data transfer rate of the disk is 64 MB/second.    

(e) What is the purpose of SCSI? Compare and contrast SCSI with that of IDE? Which of the two is better for a Server? Justify your answer.

(f) Define each of the following term. Describe the major purpose/ use/ advantage.

(i) Inode

(ii) Reading from CD-ROM disk

(iii) Raster Display

(iv) Use of colour depths

(v) Scan codes in keyboards

(vi) Resolution of monitor

problem 3)

(a) Suppose that the new machine has been developed. This machine has 64 general purpose registers of 64 bits each. The machine has 2 GB main memory with memory word size of 32 bits. The Instructions of this machine are of one or two memory words. Each instruction should have at most two operand addresses. The machine implements the internal stack on 32 of its registers. Name four addressing modes which should be supported by such a machine. Give justification of the selection of each of the addressing modes.                                             

(b) Suppose a hypothetical machine which has only PC, AC, MAR, IR, DR and Flag registers. Assume that the instruction of this machine has only one operand address (it should be a register operand, except for the load and store instructions that require this operand to be a memory operand).  The second operand is supposed to be any one of the register depending on the type of instruction. It has an instruction:

LOAD InsMem // this instruction causes next instruction that is in the memory location pointed to by PC register to get loaded into the IR register. This instruction also uses MAR, DR, PC and IR registers.

prepare and describe the sequence of micro-operations which are required to load and execute the next instruction. Make and state appropriate assumptions, if any.                     

(d) Describe Control memory Organisation with the help of the diagram. Describe how this control memory might be used to do different instruction cycles.            

(e) describe the purpose of pipelining in a processor? Describe with the help of the ex. Draw diagram and describe a four stage instruction pipeline that has the following cycles:

Instruction Fetch
Instruction and address decode
Operand Fetch
Execute and store results

(f) Suppose that a RISC machine has 128 registers out of which 32 registers are reserved for the Global variables. Suppose that 10 registers are to be used for storing two input parameters, two output parameters and 6 local variables of a single function. Describe with the help of a diagram, how remaining registers could be used as overlapped register windows that might be used for implementing procedure call. Also demonstrate the parameter passing for the subroutine calls.        

problem4)

(a) prepare the program in 8086 assembly Language (with proper comments) to find if the two given strings of length 5 are reverse of each other. You might suppose that both strings are available in the memory. Make appropriate assumptions, if any.                                         

(b) prepare program in 8086 assembly language to convert two digit unpacked BCD number into equivalent ASCII digits and a packed BCD number. The packed BCD number is to be stored in BH register. Your program should print the two ASCII digits. You might suppose that the unpacked BCD numbers are in the AL and BL registers.           

(c) prepare simple near procedure in 8086 assembly language which receives one parameter value in AL register from main module and returns sign bit of the input parameter. Make appropriate assumptions, if any.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92147

Have any Question? 


Related Questions in Computer Engineering

Get the data for names in prior decades from the social

Get the data for names in prior decades from the Social Security Administration. Paste the table data in files named babynames80s.txt, etc. Modify the BabyNames.java program so that it prompts the user for a file name. T ...

Ladies in gentlemen im in dier need of some serious

Ladies in Gentlemen, I'm in dier need of some serious assistance.  I'm not feeling well and I'm in a crunch. Could really use assistance with this one. Write  a 1,050 to 1,400-word paper in which you describe the impact ...

1 in sctp a packet is carrying a cookie echo message and a

1. In SCTP, a packet is carrying a COOKIE ECHO message and a DATA chunk. If the size of the cookie is 200 bytes and that of the user data is 20 bytes, what is the size of the packet? 2. In SCTP, a packet is carrying a CO ...

1 list and define the factors that are likely to shift in

1. List and define the factors that are likely to shift in an organization's information security environment. 2. Who decides if the information security program can adapt to change adequately? 3. List and briefly descri ...

1 explain the advantages of ipv6 when compared to ipv42

1. Explain the advantages of IPv6 when compared to IPv4. 2. Explain the use of the flow field in IPv6. What is the potential application of this field? 3. Distinguish between compatible and mapped addresses and explain t ...

Java questionwrite an application that will enable a vendor

Java question: Write an application that will enable a vendor to see what earnings he can expect to make based on what percentage he marks up an item. Allow the user to input the wholesale item price. In a tabular form, ...

Explain what differentiation strategy your company should

Explain what differentiation strategy your company should undertake to encourage their target market to choose them over other competitors. "NETFLIX"

Explain what the specific key environmental forces are that

Explain what the specific key environmental forces are that created an opportunity for your company. Company, drive through Wine store.

Search the world wide web for job descriptions of project

Search the World Wide Web for job descriptions of project managers. You can use any number of Web sites, including www.monster.com or www.dice.com, to find at least ten IT-related job descriptions. What common elements d ...

Write your own bitarray class without inheriting from the

Write your own BitArray class (without inheriting from the BitArray class) that includes a conversion method that takes Boolean values and converts them to bit values. Hint: use a BitArray as the main data structure of t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro