Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Suppose there are 64 different op codes and 19-bit instruction word in a computer system. Two bits in the instruction are reserved to point out the addressing mode.

a) Draw a box style sketch of a CPU showing and labeling Special Purpose Registers:

PC, IR, MAR and MDR and General Purpose Registers: Accumulator, R0-R3.

b) How many different memory locations can this system access by using direct and absolute addressing mode?

c) How many different memory locations can this CPU access by using base or offset addressing mode, if a 14-bit general purpose register serves as the base and can be loaded with any value?

problem 2: Consider an 8-bit system with 32-memory locations (numbered from 0 to 31) and 8 different instructions. Suppose that op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC includes the value 00100 and is about to increment, memory locations contain the given values:

Address Contents:

01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the starting and at the end of each step of the cycles in binary.

If you believe there is no information on the contents of a particular register, point out it as [unknown] (ex: MDR [unknown]). If overflow takes place, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the given table (two first lines are given as sample):

1234_accumulator table.jpg

problem 3: Draw a memory map for a system with a memory capacity of 512MB. Each memory location in the system is 8 bits. Suppose that the system consists of one 4MB memory block used as ROM residing at the bottom of the memory followed by one 16MB module and one 8MB module of RAM. The rest is conventional memory, except for 1MB block at the top used as cache memory. Point out the position of each memory module in your memory map. In hexadecimals, label the starting byte address and ending byte address of each memory block (including empty space). And also, label the size of each memory block in MB.

problem 4: An interrupt is produced by a laser printer as a means of allocating the CPU time. Describe the sequence of events in this computer system by using polled type of interrupt handling.

problem 5: A multiplattered HDD is divided into 40 sectors and four hundred cylinders. There are four platter surfaces. The total capacity of the disc is 256MB. A cluster comprises of four blocks. The disc is rotating at a rate of 3600 rpm. The disc has an average seek time of 24 msec.

a) Determine the capacity of a cluster for this disc?
b) Determine the disc transfer rate in bytes per second?
c) Determine the average latency time and the average access time for this disc?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95881

Have any Question? 


Related Questions in Computer Engineering

1 what is the difference between a threat agent and a

1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. How is infrastructure protection (assuring the security of utility services) related to info ...

Part 1find a recent article or video describing the

Part 1 Find a recent article or video describing the competition between two or more businesses. And describe in 2-5 sentences on the following: 1 The competing businesses and they sell 2 Which company you believe is win ...

Describe two types of variables or methods that can be used

Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types.

This exercise involves designing a help-desk priority

This exercise involves designing a help-desk priority manager. Help requests are stored in a text file with the following structure: priority, id of requesting party, time of request The priority is an integer in the ran ...

We conduct a known-plaintext attack on an lfsr-based stream

We conduct a known-plaintext attack on an LFSR-based stream cipher. We know that the plaintext sent was: 1. What is the degree m of the key stream generator? 2. What is the initialization vector? 3. Determine the feedbac ...

Assume we need to design a selective-repeat sliding-window

Assume we need to design a Selective-Repeat sliding-window protocol for a network in which the bandwidth is 1 Gbps and the average distance between the sender and receiver is 5,000 km. Assume the average packet size is 5 ...

1 what is a performance baseline2 what is the difference

1. What is a performance baseline? 2. What is the difference between vulnerability assessment and penetration testing? 3. What are the objectives of the external monitoring domain of the maintenance model?

1 implement the function treesizeroot which computes the

1. Implement the function treeSize(root), which computes the number of nodes in a binary tree. 2. Implement the function treeHeight(root), which computes the height of a binary tree. 3. Implement the computeOp(lvalue, op ...

Suppose that 95 of the execution time in a certain program

Suppose that 95% of the execution time in a certain program is due to code that can be split into N independent parts each of which can be executed by a separate processor. The remaining 5% is sequential and must execute ...

The power of marketingmarketers cannot create demand or

The Power of Marketing Marketers cannot create demand or make people buy things that they don't want or need. However marketing is designed to persuade, inform, and remind people about the availability, choices, features ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro