Ask Question, Ask an Expert


Ask Computer Engineering Expert

Answer all the problems.


(a) Do following arithmetic operations by using binary signed 2’s complement notation for integers. You might suppose that maximum size of integers is of 10 bits including sign bit. (Note that the numbers given here are in decimal notation)                

i) Add – 512  and 198

ii) Subtract 400 from  –98

iii) Add 400 and 112

Please indicate overflow if occurs.

(b) Convert hexadecimal number: 21 3A FE  into binary, octal and decimal equivalent.   

(c) Convert following string into equivalent “UTF 16” code –

     “Email addresses always use @ sign”.
    Are these codes same as that used in ASCII?                                  

(d) Design two logic circuits. First circuit takes 3 bit input and produces an odd parity bit output of three input bits. Second circuit takes three bit input and parity bit (which is produced as output of circuit 1) and outputs 0 if the odd parity is satisfied, else it outputs 1. Draw truth tables and use K-map to design Boolean expressions for each of the output bits. Draw resulting circuit diagram by using AND – OR – NOT gates.                  

(e) Design two bit counter (a sequential circuit) which counts as 0, 1, 2, 0, 1, 2... and so on. You must draw state table, state diagram, the k-map for circuit design, logic diagram of the resultant design using D flip-flop.                            

(f) Design floating point representation of size 24 bits closer to IEEE 754 format. Number should have a 7 bit biased exponent having a bias of 64. You might suppose that mantissa is in normalised form with first bit being the sign bit of mantissa. Represent the number (34.125) 10 using this format    .                                      


(a) A RAM has a capacity of 256K × 8.

(i) How many data input and output lines does this RAM required? Describe your answer.

(ii) How many address lines would be required for this RAM? Describe.

(b) A computer have 1024 words RAM with word size of 16 bits and a cache memory of 16 Blocks with block size of 32 bits draw a diagram to demonstrate the address mapping of RAM and Cache, if  (i) direct cache mapping is used, and (ii) the two way set associative memory to cache mapping scheme is used.          

(c) Compare different Input/output techniques which are used in a general purpose computer. Which I/O technique would be used for each of the following situation? Give justification in support of your answer.   

(i) Data input to a chat server

(ii) Copying the data from one disk file to another disk file                  

(d) Define different terms relating to access of a Magnetic disk. Determine the average disk access time which reads or prepares to a 2048 byte sector. Suppose that the disk rotates at 3000 rpm; each track of the disk has 16 sectors and data transfer rate of the disk is 64 MB/second.    

(e) What is the purpose of SCSI? Compare and contrast SCSI with that of IDE? Which of the two is better for a Server? Justify your answer.

(f) Define each of the following term. Describe the major purpose/ use/ advantage.

(i) Inode

(ii) Reading from CD-ROM disk

(iii) Raster Display

(iv) Use of colour depths

(v) Scan codes in keyboards

(vi) Resolution of monitor

problem 3)

(a) Suppose that the new machine has been developed. This machine has 64 general purpose registers of 64 bits each. The machine has 2 GB main memory with memory word size of 32 bits. The Instructions of this machine are of one or two memory words. Each instruction should have at most two operand addresses. The machine implements the internal stack on 32 of its registers. Name four addressing modes which should be supported by such a machine. Give justification of the selection of each of the addressing modes.                                             

(b) Suppose a hypothetical machine which has only PC, AC, MAR, IR, DR and Flag registers. Assume that the instruction of this machine has only one operand address (it should be a register operand, except for the load and store instructions that require this operand to be a memory operand).  The second operand is supposed to be any one of the register depending on the type of instruction. It has an instruction:

LOAD InsMem // this instruction causes next instruction that is in the memory location pointed to by PC register to get loaded into the IR register. This instruction also uses MAR, DR, PC and IR registers.

prepare and describe the sequence of micro-operations which are required to load and execute the next instruction. Make and state appropriate assumptions, if any.                     

(d) Describe Control memory Organisation with the help of the diagram. Describe how this control memory might be used to do different instruction cycles.            

(e) describe the purpose of pipelining in a processor? Describe with the help of the ex. Draw diagram and describe a four stage instruction pipeline that has the following cycles:

Instruction Fetch
Instruction and address decode
Operand Fetch
Execute and store results

(f) Suppose that a RISC machine has 128 registers out of which 32 registers are reserved for the Global variables. Suppose that 10 registers are to be used for storing two input parameters, two output parameters and 6 local variables of a single function. Describe with the help of a diagram, how remaining registers could be used as overlapped register windows that might be used for implementing procedure call. Also demonstrate the parameter passing for the subroutine calls.        


(a) prepare the program in 8086 assembly Language (with proper comments) to find if the two given strings of length 5 are reverse of each other. You might suppose that both strings are available in the memory. Make appropriate assumptions, if any.                                         

(b) prepare program in 8086 assembly language to convert two digit unpacked BCD number into equivalent ASCII digits and a packed BCD number. The packed BCD number is to be stored in BH register. Your program should print the two ASCII digits. You might suppose that the unpacked BCD numbers are in the AL and BL registers.           

(c) prepare simple near procedure in 8086 assembly language which receives one parameter value in AL register from main module and returns sign bit of the input parameter. Make appropriate assumptions, if any.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92147

Have any Question? 

Related Questions in Computer Engineering

In a company all files which are sent on the network are

In a company, all files which are sent on the network are automatically encrypted by using AES-128 in CBC mode. A fixed key is used, and the IV is changed once per day. The network encryption is file-based, so that the I ...

With the sun directly overhead an airplane takes off at a

With the sun directly overhead, an airplane takes off at a speed S of 226 mph at an angle θ of 16° above the horizontal. How fast is the airplane's shadow moving along the runway?

Assignment applications of graph theoryin 1736 a famous

Assignment: Applications of Graph Theory In 1736, a famous Swiss mathematician Leonhard Euler (1707 - 1783) started the work in the area of Graph Theory through his successful attempt in solving the problem of "Seven Bri ...

Identifying purposes and characteristics of

Identifying Purposes and Characteristics of Processors Identifying Purposes and Characteristics of Memory How to Disassembling and Reassembling Laptops. How to Installing and Configuring Expansion Cards What are the diff ...

1 why are the marginal benefit and marginal abatement cost

1. Why are the marginal benefit and marginal abatement cost of pollution considered equivalent? 2. How do regulators use Pigouvian taxes to produce efficient outcomes? 3. Describe how tradable pollution permits can be us ...

A tlu with weight vector w and threshold b implements a

A TLU with weight vector W and threshold B implements a hyperplane boundary. Derive an expression for the Euclidean distance of the hyperplane from the origin. From an arbitrary point X. (Refer to Figure 3.1)

1 what is a virtual switching element2 why should a small

1. What is a virtual switching element? 2. Why should a small business opt to virtualize its computing resources? 3. In recent years, there has been a phenomenal growth in the business use of computing virtualization tec ...

Purposethis project involves creation of a web page that

Purpose: This project involves creation of a web page that plays the Rock, Paper, Scissors game with the user. Basic Features: Your web version of the game needs to have the following required features: A proper title. B ...

1 how many point-to-point wans are needed to connect n lans

1. How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN? 2. When we use local telephones to talk to a friend, are we using a circuitswitched netw ...

1 consider the statement an individual threat agent like a

1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card n ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro