Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Representing Text and Numbers

A) Latin alphabetic characters can be represented using their ASCII equivalents. prepare the decimal representation of all the characters in “Pei, I.M.” (don’t forget that the punctuation and blank space are considered characters here).

B) UNICODE is a set of numeric values for characters and symbols from around the world. Find the hexadecimal for the Greek letter π (lower case pi) in the table at http://www.unicode.org/charts/

A binary string can mean different things, depending on how it’s interpreted.

C) What decimal number does 01101101 represent if it is interpreted as an unsigned binary number?

D) What ASCII character does the binary string in Problem C represent? You may use the charts at http://www.ascii-code.com

E) What single character does 00011011 00001001 represent in the tables at http://www.unicode.org/charts/?

problem 2: Binary Arithmetic

What is the result of the following 8-bit unsigned binary operations? Give the result in unsigned binary.

A) 00101011 + 01100110

B) 11101000 - 00110101

What is the result of the following 8-bit two’s complement binary operations? Give the result in two’s complement binary.

C) 00110011 + 10011001

D) 11110011 + 10010101

Suppose you have a color represented as a red, green, blue triple, with each component an integer between 0 and 255 represented as an 8-bit unsigned binary number. The red component is 10010011, the green 11111000, and the blue 00001111.

E) What happens if, in an attempt to make the color more red, you add 10000000 to the red component, while leaving the green and blue components as they were?

Convert the following problem into two’s complement binary and perform addition to get the resulting two’s complement binary solution.

F) 80 − 117

problem 3: Logic Tables

Fill in the following logic tables:

A)

574_logic tables_1.jpg

B)

1973_logic tables_2.jpg

problem 4: Interpreting Logical Statements

View the 2012 list of the 1000 largest US Corporations from Fortune Magazine on the web at http://money.cnn.com/magazines/fortune/fortune500/2012/full list/. This site is linked from the Moodle page so you do not need to retype it. Indicate whether each of the following statements is true or false:

A) Hewlett-Packard has more revenue than Apple, and has more profit than International Business Machines (IBM).

B) If Apple has more profit than Microsoft and Amazon.com has more pro?t than Hewlett-Packard, then Google has more profit than Cisco Systems.

C) Microsoft has more profit than each of the following: Hewlett-Packard, IBM, Dell, Intel, Amazon.com, and Google.

D) Either Cisco Systems has more revenue than Sysco, or Cisco Systems has more profit than Sysco, but not both.

E) If Honeywell International has less revenue than Oracle, then either Microsoft has more profit than Oracle or Apple has more profit than Oracle, but not both.

F) Intel has more revenue than Amazon.com or AT&T has more profit than Microsoft, and it is not the case that both Intel and Microsoft each have more profit than Cisco Systems.

G) Intel and Medtronic both appear on the Top 100 list, or AT&T and Verizon Communications each have more profit than Microsoft.

problem 5: Logic Puzzle

A) Solve the following logic puzzle: You are planning a vacation to Canada with some of your relatives, and you and they vote on which city below to visit. One city got four vote, two got two votes, two got one vote, and the remaining two cities got zero votes. Use logic and the clues below to determine how many votes each city got.

Quebec City
Toronto
Ottawa
Montreal
St. John’s (Newfoundland)
Charlottetown
Halifax

Here are the clues. Make sure you describe how you obtained your answser.

a) Ottawa and Quebec City got different number of votes.
b) Montreal either got the most votes, or it got zero votes.
c) Quebec City got more votes than Halifax did.
d) In the list of cities above, each of the two cities that got two votes has a city that got no votes immediately above it in the list.
e) Either Halifax got one fewer votes than Toronto did, or it got one fewer vote than Ottawa did.

problem 6: Binary and Algorithms

Sometime algorithms work at the bit level. (For ex, serious encryption techniques use a variety of bit-level operations so the encrypted message is difficult to “crack.”) These algorithms are difficult to trace, but doing so is a good exercise in understanding both algorithms and bit operations.

Consider the following algorithm:

BitLogic(a, b)
 Input: two 4-bit binary strings a and b.
 Output: one 4-bit binary string output
1 Set i = 1
2 while i < 4
3 output[i] = b[i + 1]
4 Set i = i + 1
5 Set output[4] = 1
6 Set i = 1
7 while i ≤ 4
8 output[i] = output[i] AND (NOT(a[i]))
9 Set i = i + 1
10 Set tmp = output[4]
11 Set output[4] = output[3]
12 Set output[3] = tmp
13 Print output

Note: In the pseudocode for this problem we use the notation output[i] to mean the value of the ith bit of binary string output, read left to right. So output[1] is the most significant (leftmost) bit and output[4] is the least significant (rightmost) bit, as shown in this figure:

most signi?cant =⇒ least signi?cant
| 1 | 2 | 3 | 4 |
smallest index =⇒ largest index

For ex, if a = 0011, then a[1] = 0 and a[4] = 1. If b = 1010, then b[1] = 1 and b[4] = 0.

A) Trace through the algorithm for input a = 0011, b = 1010. Specifically, (a) show the values of i and output immediately before each time Line 4 is executed, (b) show the values of i and output immediately before each time Line 9 is executed, and (c) show what is printed. In part (a), if a variable is not yet assigned a value when Line 4 is executed, leave the value for that variable blank.

B) Trace through the algorithm for input a = 1001, b = 1111. Specifically, (a) show the values of i and output immediately before each time Line 4 is executed, (b) show the values of i and output immediately before each time Line 9 is executed, and (c) show what is printed. In part (a), if a variable is not yet assigned a value when Line 4 is executed, leave the value for that variable blank.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9988

Have any Question? 


Related Questions in Computer Engineering

1 what methods does a social engineering hacker use to gain

1. What methods does a social engineering hacker use to gain information about a user's login id and password? How would this method differ if it were targeted towards an administrator's assistant versus a data-entry cle ...

Coursemultimedia systems developmentquestionsq1 identify

Course: (Multimedia Systems Development) Questions: Q.1 Identify and explain the three major interrelated tasks for creating 3-D animation. Q.2 Identify and explain the advantages of sampled sound and synthesized sound. ...

How do you use the method of lines and an ode solver to

How do you use the method of lines and an ODE solver to solve the second order wave equation?

Research a company that has moved some of its operations

Research a company that has moved some of its operations overseas. Discuss how this has directly affected the American workforce.  Applying concepts you learned in the required readings, discuss who has benefited more fr ...

We now show how an attack with chosen ciphertext can be

We now show how an attack with chosen ciphertext can be used to break an RSA encryption. 1. Show that the multiplicative property holds for RSA, i.e., show that the product of two ciphertexts is equal to the encryption o ...

In the second extension of dla simple we make the

In the second extension of DLA Simple, we make the probability of sticking dependent on the number of neighbors. We accomplished this by multiplying the probability of sticking by the fraction of neighbors that are green ...

Multimedia systems development assignmentquestion 11what is

Multimedia Systems Development Assignment Question 1 1. What is the difference between the following: a. Graphical user interface (GUI) and Natural user interface (NUI). b. Speech recognition and Speech synthesis. c. Bit ...

Task descriptionproject animationusing adobe after effects

TASK DESCRIPTION Project: Animation Using Adobe After Effects students are to create an animation. LEARNING OUTCOMES - Produce documents and present work in multimedia formats appropriate for the intended audience. - App ...

In this exercise we want to analyze some variants of key

In this exercise, we want to analyze some variants of key derivation. In practice, one masterkey kMK is exchanged in a secure way (e.g. certificate-based DHKE) between the involved parties. Afterwards, the session keys a ...

Soon after the board of directors meeting charlie was

Soon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new position that reports to the CIO, Gladys Williams, and that was created to provide leadership for SLS's efforts ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro