+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

problem1)

(a) Do following arithmetic operations by using binary signed 2’s complement notation for integers. You might suppose that maximum size of integers is of 10 bits including sign bit. (Note that the numbers given here are in decimal notation)

i) Add – 512  and 198

ii) Subtract 400 from  –98

(b) Convert hexadecimal number: 21 3A FE  into binary, octal and decimal equivalent.

(c) Convert following string into equivalent “UTF 16” code –

“Email addresses always use @ sign”.
Are these codes same as that used in ASCII?

(d) Design two logic circuits. First circuit takes 3 bit input and produces an odd parity bit output of three input bits. Second circuit takes three bit input and parity bit (which is produced as output of circuit 1) and outputs 0 if the odd parity is satisfied, else it outputs 1. Draw truth tables and use K-map to design Boolean expressions for each of the output bits. Draw resulting circuit diagram by using AND – OR – NOT gates.

(e) Design two bit counter (a sequential circuit) which counts as 0, 1, 2, 0, 1, 2... and so on. You must draw state table, state diagram, the k-map for circuit design, logic diagram of the resultant design using D flip-flop.

(f) Design floating point representation of size 24 bits closer to IEEE 754 format. Number should have a 7 bit biased exponent having a bias of 64. You might suppose that mantissa is in normalised form with first bit being the sign bit of mantissa. Represent the number (34.125) 10 using this format    .

problem2)

(a) A RAM has a capacity of 256K × 8.

(i) How many data input and output lines does this RAM required? Describe your answer.

(ii) How many address lines would be required for this RAM? Describe.

(b) A computer have 1024 words RAM with word size of 16 bits and a cache memory of 16 Blocks with block size of 32 bits draw a diagram to demonstrate the address mapping of RAM and Cache, if  (i) direct cache mapping is used, and (ii) the two way set associative memory to cache mapping scheme is used.

(c) Compare different Input/output techniques which are used in a general purpose computer. Which I/O technique would be used for each of the following situation? Give justification in support of your answer.

(i) Data input to a chat server

(ii) Copying the data from one disk file to another disk file

(d) Define different terms relating to access of a Magnetic disk. Determine the average disk access time which reads or prepares to a 2048 byte sector. Suppose that the disk rotates at 3000 rpm; each track of the disk has 16 sectors and data transfer rate of the disk is 64 MB/second.

(e) What is the purpose of SCSI? Compare and contrast SCSI with that of IDE? Which of the two is better for a Server? Justify your answer.

(f) Define each of the following term. Describe the major purpose/ use/ advantage.

(i) Inode

(iii) Raster Display

(iv) Use of colour depths

(v) Scan codes in keyboards

(vi) Resolution of monitor

problem 3)

(a) Suppose that the new machine has been developed. This machine has 64 general purpose registers of 64 bits each. The machine has 2 GB main memory with memory word size of 32 bits. The Instructions of this machine are of one or two memory words. Each instruction should have at most two operand addresses. The machine implements the internal stack on 32 of its registers. Name four addressing modes which should be supported by such a machine. Give justification of the selection of each of the addressing modes.

(b) Suppose a hypothetical machine which has only PC, AC, MAR, IR, DR and Flag registers. Assume that the instruction of this machine has only one operand address (it should be a register operand, except for the load and store instructions that require this operand to be a memory operand).  The second operand is supposed to be any one of the register depending on the type of instruction. It has an instruction:

LOAD InsMem // this instruction causes next instruction that is in the memory location pointed to by PC register to get loaded into the IR register. This instruction also uses MAR, DR, PC and IR registers.

prepare and describe the sequence of micro-operations which are required to load and execute the next instruction. Make and state appropriate assumptions, if any.

(d) Describe Control memory Organisation with the help of the diagram. Describe how this control memory might be used to do different instruction cycles.

(e) describe the purpose of pipelining in a processor? Describe with the help of the ex. Draw diagram and describe a four stage instruction pipeline that has the following cycles:

Instruction Fetch
Operand Fetch
Execute and store results

(f) Suppose that a RISC machine has 128 registers out of which 32 registers are reserved for the Global variables. Suppose that 10 registers are to be used for storing two input parameters, two output parameters and 6 local variables of a single function. Describe with the help of a diagram, how remaining registers could be used as overlapped register windows that might be used for implementing procedure call. Also demonstrate the parameter passing for the subroutine calls.

problem4)

(a) prepare the program in 8086 assembly Language (with proper comments) to find if the two given strings of length 5 are reverse of each other. You might suppose that both strings are available in the memory. Make appropriate assumptions, if any.

(b) prepare program in 8086 assembly language to convert two digit unpacked BCD number into equivalent ASCII digits and a packed BCD number. The packed BCD number is to be stored in BH register. Your program should print the two ASCII digits. You might suppose that the unpacked BCD numbers are in the AL and BL registers.

(c) prepare simple near procedure in 8086 assembly language which receives one parameter value in AL register from main module and returns sign bit of the input parameter. Make appropriate assumptions, if any.

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M92147

Have any Question?

## Related Questions in Computer Engineering

### 1 what information does an action event object carry what

1. What information does an action event object carry? What additional information does a mouse event object carry? 2. Why are we using inner classes for event listeners? If Java did not have inner classes, could we stil ...

### Assignmentdefineupdate the security objectives for

Assignment Define/update the "security objectives" for confidentiality, integrity, and availability of information resources, describing the potential harm/security impact that failure to achieve security objectives woul ...

### 1 you think that a computer with the domain name

1. You think that a computer with the domain name "aCollege.edu" has severalIP addresses. Write a statement in Java to create an array of InetAddress objects associated with this host. 2. You think that a computer with t ...

### Repeat 4164 but now your predictor should be able to

Repeat 4.16.4, but now your predictor should be able to eventually (after a warm-up period during which it can make wrong predictions) start perfectly predicting both this pattern and its opposite. Your predictor should ...

### Discuss how collision and broadcast domains are related but

Discuss how collision and broadcast domains are related, but different. You should compare and contrast the two domains.

### Implement the bankers algorithm- needed before the end of

Implement the Banker's algorithm- needed before the end of today Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N The input data and result is then ...

### 1 search the web for the forum of incident response and

1. Search the Web for the Forum of Incident Response and Security Teams (FIRST). In your own words, what is the forum's mission? 2. Search the Web for two or more sites that discuss the ongoing responsibilities of the se ...

### To avoid shutting down a website when changing the server

To avoid shutting down a website when changing the server of the website, redirecting traffic to an intermittent subdomain is required? List the steps of the redirection process?

### 1 what is the maximum number of characters or symbols that

1. What is the maximum number of characters or symbols that can be represented by Unicode? 2. A color image uses 16 bits to represent a pixel. What is the maximum number of different colors that can be represented? 3. As ...

### 1 indicate dependences and their type2 assume there is no

1. Indicate dependences and their type. 2. Assume there is no forwarding in this pipelined processor. Indicate hazards and add nop instructions to eliminate them. 3. Assume there is full forwarding. Indicate hazards and ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro