Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Homework

Before starting this homework assignment, please be sure that you have completed all of the following activities.

• View the relevant online lectures and read associated sections in the textbook before or while you work on this homework assignment.
• Review the course syllabus. Note the grading policies, including policies for submitting assignments.
• Review the course schedule. Note the due dates for course assignments, including this one.
• Review the Graduate Honor System at http://ghs.graduateschool.vt.edu. Review the Graduate Honor System Constitution at http://ghs.graduateschool.vt.edu/ghs_constitution.html, especially Articles I (Sections 1, 2, and 3), V, VI, VII, VIII, and IX.

Please note the following.

• Solutions must be clear and presented in the order assigned. Solutions must show work needed, as appropriate, to derive your answers. Written answers should be concise, but sufficiently complete to answer the question. Neat hand drawings, where needed, are acceptable. Your final solution for each problem must be easily identified.

• At the top of the first page, include: your name (as recorded by the university); your email address; and the assignment name ("ECE 4500, Homework 3"). Do not include your Virginia Tech ID number or your social security number.

• Homework must be submitted as a PDF (.pdf) file with the file name lastname_firstname.pdf, where lastname is your last or family name and firstname is your first or given name. Submit a single file.

This homework consists of the following problems. Problems are from L. Null and J. Lobur, The Essentials of Computer Organization and Architecture, 3rd edition, Jones and Bartlett Learning, 2012 (ISBN 9781449600068) unless otherwise noted. The problems from the textbook are from the Exercises section of Chapter 4 (pages 260-267).

1. Do Exercise 5. (For part b, assume a 16-bit word.)
2. Do Exercise 8.
3. Do Exercise 12.

4. Section 4.10 of the text provides an example of the execution of a simple MARIE program. For this problem, you are to complete a similar example for a different program. In particular, for the MARIE program given below, you are to complete the equivalent of Figure 4.14, but for the program below. You do not need to show how the "Halt" instruction is executed. Specify values in PC, IR, MAR, MBR, and AC in hexadecimal. A template for your answer is provided as a Microsoft Word file that is included with this assignment on Scholar. You are to incorporate your answer for this problem into your submission for the homework assignment so that you submit only one PDF file for the entire assignment.

The program is as follows. Note that this table is the equivalent of Table 4.3 in the textbook, only for a different program.

Hex Address

 

Instruction

Binary Contents of Memory Address

Hex Contents of Memory

100

Load      105

0001 0001 0000 0101

1105

101

Subt      104

0100 0001 0000 0100

4104

102

Store     104

0010 0001 0000 0100

2104

103

Halt

0111 0000 0000 0000

7000

104

00A3

0000 0000 1010 0011

00A3

105

00F3

0000 0000 1111 0011

00F3

5. Scavenger Hunt: Two pioneers of early computers and computer organization were Howard H. Aiken and John von Neumann. Answer the questions below regarding Aiken and von Neumann. Cite sources used for your answers.

a. Is Aiken or is von Neumann associated with the so-called Princeton architecture?

b. Is Aiken or is von Neumann associated with the so-called Harvard architecture?

c. What is the key feature of a Princeton architecture computer compared to the Harvard architecture?

d. Does the MARIE architecture owe more to Aiken or von Neumann? Briefly justify your answer.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91597164
  • Price:- $160

Guranteed 48 Hours Delivery, In Price:- $160

Have any Question?


Related Questions in Computer Engineering

Strong passwords are at least 8 characters in length

Strong passwords are at least 8 characters in length, contain both upper- and lower-case letters, as well as some digits and special characters. Use the requirements (specified below) for a password to define in BNF a gr ...

What are some of the basic principles involved with

What are some of the basic principles involved with utilizing the ADT stack? What are some applications that could effectively utilize a stack?

You really need help with this assignment please provide

You really need help with this assignment. Please provide step by step instructions and screenshot of the steps and execution, so I can follow how to complete this assignment. Prof. Orlando Karam maintains an Ubuntu Linu ...

Total cholesterol in children 10 to 15 years of age is

Total cholesterol in children 10 to 15 years of age is assumed to follow a normal distribution of 191 and a standard deviation 22.4. What proportion of children 10 to 15 years of age has total cholesterol between 180 and ...

What are some skills individuals who work in the field of

What are some skills individuals who work in the field of cyber security need to prevent hacks in to a company's computers?

Take a tour of your building on campus or at work what is

Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control devices. How do these access controls change at night when work ...

With more persons working from home how does one separate

With more persons working from home, how does one separate data intended for the employer form what might be considered personal property? What policies could be put in place to ensure employees adhere to safe guidelines ...

Scenarioyour algorithm will keep track of a customers

Scenario Your algorithm will keep track of a customer's purchases at the local fireworks stand. Customers will not know exactly how many items they will purchase, so using a For loop on this lab is not allowed. Let's kee ...

Assignment - confidential organizational information and

Assignment - Confidential Organizational Information and Employee Responsibility As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to ...

Wat type of malware do you think is the most destructive

What type of malware do you think is the most destructive : viruses, worms, trojan programs, spyware or adware.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As