Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1)

(a) Do following arithmetic operations by using binary signed 2’s complement notation for integers. You might suppose that maximum size of integers is of 10 bits including sign bit. (Note that the numbers given here are in decimal notation)                

i) Add – 512  and 198

ii) Subtract 400 from  –98

iii) Add 400 and 112

Please indicate overflow if occurs.

(b) Convert hexadecimal number: 21 3A FE  into binary, octal and decimal equivalent.   

(c) Convert following string into equivalent “UTF 16” code –

     “Email addresses always use @ sign”.
    Are these codes same as that used in ASCII?                                  

(d) Design two logic circuits. First circuit takes 3 bit input and produces an odd parity bit output of three input bits. Second circuit takes three bit input and parity bit (which is produced as output of circuit 1) and outputs 0 if the odd parity is satisfied, else it outputs 1. Draw truth tables and use K-map to design Boolean expressions for each of the output bits. Draw resulting circuit diagram by using AND – OR – NOT gates.                  

(e) Design two bit counter (a sequential circuit) which counts as 0, 1, 2, 0, 1, 2... and so on. You must draw state table, state diagram, the k-map for circuit design, logic diagram of the resultant design using D flip-flop.                            

(f) Design floating point representation of size 24 bits closer to IEEE 754 format. Number should have a 7 bit biased exponent having a bias of 64. You might suppose that mantissa is in normalised form with first bit being the sign bit of mantissa. Represent the number (34.125) 10 using this format    .                                      

problem2)

(a) A RAM has a capacity of 256K × 8.

(i) How many data input and output lines does this RAM required? Describe your answer.

(ii) How many address lines would be required for this RAM? Describe.

(b) A computer have 1024 words RAM with word size of 16 bits and a cache memory of 16 Blocks with block size of 32 bits draw a diagram to demonstrate the address mapping of RAM and Cache, if  (i) direct cache mapping is used, and (ii) the two way set associative memory to cache mapping scheme is used.          

(c) Compare different Input/output techniques which are used in a general purpose computer. Which I/O technique would be used for each of the following situation? Give justification in support of your answer.   

(i) Data input to a chat server

(ii) Copying the data from one disk file to another disk file                  

(d) Define different terms relating to access of a Magnetic disk. Determine the average disk access time which reads or prepares to a 2048 byte sector. Suppose that the disk rotates at 3000 rpm; each track of the disk has 16 sectors and data transfer rate of the disk is 64 MB/second.    

(e) What is the purpose of SCSI? Compare and contrast SCSI with that of IDE? Which of the two is better for a Server? Justify your answer.

(f) Define each of the following term. Describe the major purpose/ use/ advantage.

(i) Inode

(ii) Reading from CD-ROM disk

(iii) Raster Display

(iv) Use of colour depths

(v) Scan codes in keyboards

(vi) Resolution of monitor

problem 3)

(a) Suppose that the new machine has been developed. This machine has 64 general purpose registers of 64 bits each. The machine has 2 GB main memory with memory word size of 32 bits. The Instructions of this machine are of one or two memory words. Each instruction should have at most two operand addresses. The machine implements the internal stack on 32 of its registers. Name four addressing modes which should be supported by such a machine. Give justification of the selection of each of the addressing modes.                                             

(b) Suppose a hypothetical machine which has only PC, AC, MAR, IR, DR and Flag registers. Assume that the instruction of this machine has only one operand address (it should be a register operand, except for the load and store instructions that require this operand to be a memory operand).  The second operand is supposed to be any one of the register depending on the type of instruction. It has an instruction:

LOAD InsMem // this instruction causes next instruction that is in the memory location pointed to by PC register to get loaded into the IR register. This instruction also uses MAR, DR, PC and IR registers.

prepare and describe the sequence of micro-operations which are required to load and execute the next instruction. Make and state appropriate assumptions, if any.                     

(d) Describe Control memory Organisation with the help of the diagram. Describe how this control memory might be used to do different instruction cycles.            

(e) describe the purpose of pipelining in a processor? Describe with the help of the ex. Draw diagram and describe a four stage instruction pipeline that has the following cycles:

Instruction Fetch
Instruction and address decode
Operand Fetch
Execute and store results

(f) Suppose that a RISC machine has 128 registers out of which 32 registers are reserved for the Global variables. Suppose that 10 registers are to be used for storing two input parameters, two output parameters and 6 local variables of a single function. Describe with the help of a diagram, how remaining registers could be used as overlapped register windows that might be used for implementing procedure call. Also demonstrate the parameter passing for the subroutine calls.        

problem4)

(a) prepare the program in 8086 assembly Language (with proper comments) to find if the two given strings of length 5 are reverse of each other. You might suppose that both strings are available in the memory. Make appropriate assumptions, if any.                                         

(b) prepare program in 8086 assembly language to convert two digit unpacked BCD number into equivalent ASCII digits and a packed BCD number. The packed BCD number is to be stored in BH register. Your program should print the two ASCII digits. You might suppose that the unpacked BCD numbers are in the AL and BL registers.           

(c) prepare simple near procedure in 8086 assembly language which receives one parameter value in AL register from main module and returns sign bit of the input parameter. Make appropriate assumptions, if any.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92147

Have any Question? 


Related Questions in Computer Engineering

Discussion questionsthe design discipline continues the

Discussion Questions The design discipline continues the modeling process by creating new models and expanding or refining business and requirements models. However, the purpose and nature of modeling changes. Though pro ...

A searching method that uses linear interpolation can give

A searching method that uses linear interpolation can give fast retrieval when the ordered data set is relatively evenly distributed over its range of possible values. With this method. the magnitude of the value x we ar ...

Network design for schoola network has to be designed for a

Network Design for Schoola network has to be designed for a school. There are100 computers in the school. And has 5 Labs each of them consisted of 31 computersThe users in the lab should belong to a single domain and rec ...

A company develops a new security product using the extreme

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, then add more code, then test, and continue this iteration. Every day, they test the ...

1 list and describe the four categories of locks in which

1. List and describe the four categories of locks. In which situation is each type of lock preferred? 2. What are the two possible modes that locks use when they fail? What implications do these modes have for human safe ...

Companies usually restrict the use of electronic mail to

Companies usually restrict the use of electronic mail to company business but do allow minimal use for personal reasons. a. How might a company detect excessive personal use of electronic mail, other than by reading it? ...

Describe the function of each of the following types of

Describe the function of each of the following types of database keys: primary, alternate, secondary, and foreign.

Enhancement of a low-contrast image take a 25cent coin scan

(Enhancement of a low-contrast image) Take a 25¢ coin; scan and digitize it to obtain a 512 x 512 image. a. Enhance it by a suitable contrast stretching transformation and compare it with histogram equalization. b. Perfo ...

1 what special function does a cache server perform why is

1. What special function does a cache server perform? Why is this useful for larger organizations? 2. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.

1 in what ways is network design an iterative process why

1. In what ways is network design an iterative process? Why does the need for network documentation arise in many phases of a network design project? 2. When responding to an RFP, why is it important to pay attention to ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro