Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Suppose there are 64 different op codes and 19-bit instruction word in a computer system. Two bits in the instruction are reserved to point out the addressing mode.

a) Draw a box style sketch of a CPU showing and labeling Special Purpose Registers:

PC, IR, MAR and MDR and General Purpose Registers: Accumulator, R0-R3.

b) How many different memory locations can this system access by using direct and absolute addressing mode?

c) How many different memory locations can this CPU access by using base or offset addressing mode, if a 14-bit general purpose register serves as the base and can be loaded with any value?

problem 2: Consider an 8-bit system with 32-memory locations (numbered from 0 to 31) and 8 different instructions. Suppose that op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC includes the value 00100 and is about to increment, memory locations contain the given values:

Address Contents:

01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the starting and at the end of each step of the cycles in binary.

If you believe there is no information on the contents of a particular register, point out it as [unknown] (ex: MDR [unknown]). If overflow takes place, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the given table (two first lines are given as sample):

1234_accumulator table.jpg

problem 3: Draw a memory map for a system with a memory capacity of 512MB. Each memory location in the system is 8 bits. Suppose that the system consists of one 4MB memory block used as ROM residing at the bottom of the memory followed by one 16MB module and one 8MB module of RAM. The rest is conventional memory, except for 1MB block at the top used as cache memory. Point out the position of each memory module in your memory map. In hexadecimals, label the starting byte address and ending byte address of each memory block (including empty space). And also, label the size of each memory block in MB.

problem 4: An interrupt is produced by a laser printer as a means of allocating the CPU time. Describe the sequence of events in this computer system by using polled type of interrupt handling.

problem 5: A multiplattered HDD is divided into 40 sectors and four hundred cylinders. There are four platter surfaces. The total capacity of the disc is 256MB. A cluster comprises of four blocks. The disc is rotating at a rate of 3600 rpm. The disc has an average seek time of 24 msec.

a) Determine the capacity of a cluster for this disc?
b) Determine the disc transfer rate in bytes per second?
c) Determine the average latency time and the average access time for this disc?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95881

Have any Question? 


Related Questions in Computer Engineering

Assignmentyou will write a menu and ordering system for a

Assignment You will write a menu and ordering system for a restaurant using a class for the menu items. Put the class code and the main in a single file. Write a class menuItem that contains the following: A member varia ...

Provide a concrete example selected from media reports or

Provide a concrete example, selected from media reports or your personal experiences, in which attackers compromised a system by exploiting something other than the weakest link. Describe the system, describe what you vi ...

1 design and implement a timedate adt that can be used to

1. Design and implement a TimeDate ADT that can be used to represent both a date and time as a single entity. 2. A line segment is a straight line bounded by two endpoints. The Line Segment ADT, whose operations are desc ...

Implement a recursive algorithm to compute the n

Implement a recursive algorithm to compute the n! permutations of the first n integers. In your implementation, the internal recursive call should be of the form permutations (n -1) rather than permutations (k + 1) as we ...

Internetwrite one paragraph for each of the following

Internet Write one paragraph for each of the following questions: 1- What do you use the Internet for the most? What has the Internet made easier or more convenient for you in your lifetime? Can you identify some cons to ...

Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

1 of the information security organizations listed that

1. Of the information security organizations listed that have codes of ethics, which has been established for the longest time? When was it founded? 2. Of the organizations listed that have codes of ethics, which is focu ...

Filtering using phase one of the limitations of the

Filtering using phase) One of the limitations of the noise-smoothing linear filters is that their frequency response has zero phase. This means the phase distortions due to noise remain unaffected by these algorithms. To ...

Spanning trees given a node it in a amprested graph s for

Spanning trees: Given a node It in a &rested graph S. for which there is at least one path from every node in S ton, state a precise definition for a spanning tree of 9 rooted at n. Then think of what might be meant by a ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro