Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1)

(a) Do following arithmetic operations by using binary signed 2’s complement notation for integers. You might suppose that maximum size of integers is of 10 bits including sign bit. (Note that the numbers given here are in decimal notation)                

i) Add – 512  and 198

ii) Subtract 400 from  –98

iii) Add 400 and 112

Please indicate overflow if occurs.

(b) Convert hexadecimal number: 21 3A FE  into binary, octal and decimal equivalent.   

(c) Convert following string into equivalent “UTF 16” code –

     “Email addresses always use @ sign”.
    Are these codes same as that used in ASCII?                                  

(d) Design two logic circuits. First circuit takes 3 bit input and produces an odd parity bit output of three input bits. Second circuit takes three bit input and parity bit (which is produced as output of circuit 1) and outputs 0 if the odd parity is satisfied, else it outputs 1. Draw truth tables and use K-map to design Boolean expressions for each of the output bits. Draw resulting circuit diagram by using AND – OR – NOT gates.                  

(e) Design two bit counter (a sequential circuit) which counts as 0, 1, 2, 0, 1, 2... and so on. You must draw state table, state diagram, the k-map for circuit design, logic diagram of the resultant design using D flip-flop.                            

(f) Design floating point representation of size 24 bits closer to IEEE 754 format. Number should have a 7 bit biased exponent having a bias of 64. You might suppose that mantissa is in normalised form with first bit being the sign bit of mantissa. Represent the number (34.125) 10 using this format    .                                      

problem2)

(a) A RAM has a capacity of 256K × 8.

(i) How many data input and output lines does this RAM required? Describe your answer.

(ii) How many address lines would be required for this RAM? Describe.

(b) A computer have 1024 words RAM with word size of 16 bits and a cache memory of 16 Blocks with block size of 32 bits draw a diagram to demonstrate the address mapping of RAM and Cache, if  (i) direct cache mapping is used, and (ii) the two way set associative memory to cache mapping scheme is used.          

(c) Compare different Input/output techniques which are used in a general purpose computer. Which I/O technique would be used for each of the following situation? Give justification in support of your answer.   

(i) Data input to a chat server

(ii) Copying the data from one disk file to another disk file                  

(d) Define different terms relating to access of a Magnetic disk. Determine the average disk access time which reads or prepares to a 2048 byte sector. Suppose that the disk rotates at 3000 rpm; each track of the disk has 16 sectors and data transfer rate of the disk is 64 MB/second.    

(e) What is the purpose of SCSI? Compare and contrast SCSI with that of IDE? Which of the two is better for a Server? Justify your answer.

(f) Define each of the following term. Describe the major purpose/ use/ advantage.

(i) Inode

(ii) Reading from CD-ROM disk

(iii) Raster Display

(iv) Use of colour depths

(v) Scan codes in keyboards

(vi) Resolution of monitor

problem 3)

(a) Suppose that the new machine has been developed. This machine has 64 general purpose registers of 64 bits each. The machine has 2 GB main memory with memory word size of 32 bits. The Instructions of this machine are of one or two memory words. Each instruction should have at most two operand addresses. The machine implements the internal stack on 32 of its registers. Name four addressing modes which should be supported by such a machine. Give justification of the selection of each of the addressing modes.                                             

(b) Suppose a hypothetical machine which has only PC, AC, MAR, IR, DR and Flag registers. Assume that the instruction of this machine has only one operand address (it should be a register operand, except for the load and store instructions that require this operand to be a memory operand).  The second operand is supposed to be any one of the register depending on the type of instruction. It has an instruction:

LOAD InsMem // this instruction causes next instruction that is in the memory location pointed to by PC register to get loaded into the IR register. This instruction also uses MAR, DR, PC and IR registers.

prepare and describe the sequence of micro-operations which are required to load and execute the next instruction. Make and state appropriate assumptions, if any.                     

(d) Describe Control memory Organisation with the help of the diagram. Describe how this control memory might be used to do different instruction cycles.            

(e) describe the purpose of pipelining in a processor? Describe with the help of the ex. Draw diagram and describe a four stage instruction pipeline that has the following cycles:

Instruction Fetch
Instruction and address decode
Operand Fetch
Execute and store results

(f) Suppose that a RISC machine has 128 registers out of which 32 registers are reserved for the Global variables. Suppose that 10 registers are to be used for storing two input parameters, two output parameters and 6 local variables of a single function. Describe with the help of a diagram, how remaining registers could be used as overlapped register windows that might be used for implementing procedure call. Also demonstrate the parameter passing for the subroutine calls.        

problem4)

(a) prepare the program in 8086 assembly Language (with proper comments) to find if the two given strings of length 5 are reverse of each other. You might suppose that both strings are available in the memory. Make appropriate assumptions, if any.                                         

(b) prepare program in 8086 assembly language to convert two digit unpacked BCD number into equivalent ASCII digits and a packed BCD number. The packed BCD number is to be stored in BH register. Your program should print the two ASCII digits. You might suppose that the unpacked BCD numbers are in the AL and BL registers.           

(c) prepare simple near procedure in 8086 assembly language which receives one parameter value in AL register from main module and returns sign bit of the input parameter. Make appropriate assumptions, if any.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92147

Have any Question? 


Related Questions in Computer Engineering

Draw an entity relationship diagram for flapper

Draw an entity relationship diagram for Flapper Dumpling

1 what is security auditing why is it necessary for system

1. What is security auditing? Why is it necessary for system security? 2. What are the differences between security monitoring and auditing? Which is better? 3. What is risk? What is the purpose of calculating risk when ...

1 what is the relationship between d-amps and amps2 what is

1. What is the relationship between D-AMPS and AMPS? 2. What is GSM? 3. What is the function of the CDMA in IS-95? 4. What are the three types of orbits? 5. Which type of orbit does a GEO satellite have? Explain your ans ...

1 how does a signature-based idps differ from a

1. How does a signature-based IDPS differ from a behavior-based IDPS? 2. What is a monitoring (or SPAN) port? What is it used for? 3. List and describe the three control strategies proposed for IDPS control.

Cs-205 declarative programming assignmentquestion 1

CS-205 Declarative Programming Assignment Question 1: Recursion, Lists and Accumulating Parameters (a) Write the following program and compile it: % Program: ROYAL parent(queenmother,elisabeth).             parent(elisab ...

Assume we are searching a tree with branching factor b

Assume we are searching a tree with branching factor b. However, we do not know that we are really searching a tree, so we are considering checking each state description generated to see if it matches a previously gener ...

1 when a party makes a local telephone call to another

1. When a party makes a local telephone call to another party, is this a point-to point or multipoint connection? Explain the answer. 2. Compare the telephone network and the Internet. What are the similarities? What are ...

In the sixth lab we analyze the behavior of the dns

In the sixth lab, we analyze the behavior of the DNS protocol. In addition to Wireshark, several network utilities are available for finding some information stored in the DNS servers. In this lab, we use the dig utiliti ...

1 rewrite the longest common substring code as a class2

1. Rewrite the longest common substring code as a class. 2. Write a program that uses a brute-force technique to find the longest common substring. Use the Timing class to compare the brute-force method with the dynamic ...

Assignment preparationfor this assignment review the

Assignment Preparation For this assignment, review the organization and the industry before applying the strategic models below to Ford Motor Company. You will need at least five current, scholarly or professional resour ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro