Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Representing Text and Numbers

A) Latin alphabetic characters can be represented using their ASCII equivalents. prepare the decimal representation of all the characters in “Pei, I.M.” (don’t forget that the punctuation and blank space are considered characters here).

B) UNICODE is a set of numeric values for characters and symbols from around the world. Find the hexadecimal for the Greek letter π (lower case pi) in the table at http://www.unicode.org/charts/

A binary string can mean different things, depending on how it’s interpreted.

C) What decimal number does 01101101 represent if it is interpreted as an unsigned binary number?

D) What ASCII character does the binary string in Problem C represent? You may use the charts at http://www.ascii-code.com

E) What single character does 00011011 00001001 represent in the tables at http://www.unicode.org/charts/?

problem 2: Binary Arithmetic

What is the result of the following 8-bit unsigned binary operations? Give the result in unsigned binary.

A) 00101011 + 01100110

B) 11101000 - 00110101

What is the result of the following 8-bit two’s complement binary operations? Give the result in two’s complement binary.

C) 00110011 + 10011001

D) 11110011 + 10010101

Suppose you have a color represented as a red, green, blue triple, with each component an integer between 0 and 255 represented as an 8-bit unsigned binary number. The red component is 10010011, the green 11111000, and the blue 00001111.

E) What happens if, in an attempt to make the color more red, you add 10000000 to the red component, while leaving the green and blue components as they were?

Convert the following problem into two’s complement binary and perform addition to get the resulting two’s complement binary solution.

F) 80 − 117

problem 3: Logic Tables

Fill in the following logic tables:

A)

574_logic tables_1.jpg

B)

1973_logic tables_2.jpg

problem 4: Interpreting Logical Statements

View the 2012 list of the 1000 largest US Corporations from Fortune Magazine on the web at http://money.cnn.com/magazines/fortune/fortune500/2012/full list/. This site is linked from the Moodle page so you do not need to retype it. Indicate whether each of the following statements is true or false:

A) Hewlett-Packard has more revenue than Apple, and has more profit than International Business Machines (IBM).

B) If Apple has more profit than Microsoft and Amazon.com has more pro?t than Hewlett-Packard, then Google has more profit than Cisco Systems.

C) Microsoft has more profit than each of the following: Hewlett-Packard, IBM, Dell, Intel, Amazon.com, and Google.

D) Either Cisco Systems has more revenue than Sysco, or Cisco Systems has more profit than Sysco, but not both.

E) If Honeywell International has less revenue than Oracle, then either Microsoft has more profit than Oracle or Apple has more profit than Oracle, but not both.

F) Intel has more revenue than Amazon.com or AT&T has more profit than Microsoft, and it is not the case that both Intel and Microsoft each have more profit than Cisco Systems.

G) Intel and Medtronic both appear on the Top 100 list, or AT&T and Verizon Communications each have more profit than Microsoft.

problem 5: Logic Puzzle

A) Solve the following logic puzzle: You are planning a vacation to Canada with some of your relatives, and you and they vote on which city below to visit. One city got four vote, two got two votes, two got one vote, and the remaining two cities got zero votes. Use logic and the clues below to determine how many votes each city got.

Quebec City
Toronto
Ottawa
Montreal
St. John’s (Newfoundland)
Charlottetown
Halifax

Here are the clues. Make sure you describe how you obtained your answser.

a) Ottawa and Quebec City got different number of votes.
b) Montreal either got the most votes, or it got zero votes.
c) Quebec City got more votes than Halifax did.
d) In the list of cities above, each of the two cities that got two votes has a city that got no votes immediately above it in the list.
e) Either Halifax got one fewer votes than Toronto did, or it got one fewer vote than Ottawa did.

problem 6: Binary and Algorithms

Sometime algorithms work at the bit level. (For ex, serious encryption techniques use a variety of bit-level operations so the encrypted message is difficult to “crack.”) These algorithms are difficult to trace, but doing so is a good exercise in understanding both algorithms and bit operations.

Consider the following algorithm:

BitLogic(a, b)
 Input: two 4-bit binary strings a and b.
 Output: one 4-bit binary string output
1 Set i = 1
2 while i < 4
3 output[i] = b[i + 1]
4 Set i = i + 1
5 Set output[4] = 1
6 Set i = 1
7 while i ≤ 4
8 output[i] = output[i] AND (NOT(a[i]))
9 Set i = i + 1
10 Set tmp = output[4]
11 Set output[4] = output[3]
12 Set output[3] = tmp
13 Print output

Note: In the pseudocode for this problem we use the notation output[i] to mean the value of the ith bit of binary string output, read left to right. So output[1] is the most significant (leftmost) bit and output[4] is the least significant (rightmost) bit, as shown in this figure:

most signi?cant =⇒ least signi?cant
| 1 | 2 | 3 | 4 |
smallest index =⇒ largest index

For ex, if a = 0011, then a[1] = 0 and a[4] = 1. If b = 1010, then b[1] = 1 and b[4] = 0.

A) Trace through the algorithm for input a = 0011, b = 1010. Specifically, (a) show the values of i and output immediately before each time Line 4 is executed, (b) show the values of i and output immediately before each time Line 9 is executed, and (c) show what is printed. In part (a), if a variable is not yet assigned a value when Line 4 is executed, leave the value for that variable blank.

B) Trace through the algorithm for input a = 1001, b = 1111. Specifically, (a) show the values of i and output immediately before each time Line 4 is executed, (b) show the values of i and output immediately before each time Line 9 is executed, and (c) show what is printed. In part (a), if a variable is not yet assigned a value when Line 4 is executed, leave the value for that variable blank.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9988

Have any Question? 


Related Questions in Computer Engineering

1 how can the practice of information security be described

1. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? 2. Who is ultimately responsible for the security of information in ...

1 rewrite the console application that uses an

1. Rewrite the Console application that uses an iterator-based linked list as a Windows application. 2. According to legend, the 1st-century Jewish historian, Flavius Josephus, was captured along with a band of 40 compat ...

Since may 26 2002 the aes advanced encryption standard

Since May 26, 2002, the AES (Advanced Encryption Standard) describes the official standard of the US government. 1. The evolutionary history of AES differs from that of DES. Briefly describe the differences of the AES hi ...

Many programming languages especially older ones provide no

Many programming languages, especially older ones, provide no language support for concurrency. C and C++ are examples of such languages. Is it essential that a language include syntax for concurrency to be able to write ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does SMTP or POP3 have ...

The following questions are related to the sparse matrix

The following questions are related to the Sparse Matrix ADT. (a) Implement the remaining methods of the SparseMatrix class presented in the chapter using the array of sorted linked lists: getitem , transpose(), sub , an ...

Implement a queue as a linked linear list such that it only

Implement a queue as a linked linear list such that it only occupies an amount of space proportional to the current queue size

When people describe client-server architecture they are

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain.

1 implement the function treesizeroot which computes the

1. Implement the function treeSize(root), which computes the number of nodes in a binary tree. 2. Implement the function treeHeight(root), which computes the height of a binary tree. 3. Implement the computeOp(lvalue, op ...

1 what is security auditing why is it necessary for system

1. What is security auditing? Why is it necessary for system security? 2. What are the differences between security monitoring and auditing? Which is better? 3. What is risk? What is the purpose of calculating risk when ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro