Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) With neat block diagram describe the working of the first general purpose computer

b) Consider an assignment statement X = (a - b * c)/d where a, b, c, d and X are the main memory locations. prepare a set of instructions to implement the above assignment statement on:

i) Accumulator based machine and

ii) Stack oriented machine.

iii) General register machine using two address instructions

problem 2)a) Perform (-88)10*(-44)10 using Booth’s algorithm.

b) Perform (100)10÷ (15)10 using Non Restoring division algorithm. Also draw the flow chart.

problem 3)a) Certain processor needs seven instructions (I0 to I6) whose relative frequency of occurrence is as shown below:

Instruction           I0           I1           I2            I3            I4          I5           I6
Rel. Frequency   0.05        0.1         0.4        0.18         0.2       0.04       0.03

i) Develop the Huffman's tree and design appropriate OPCODE for each instruction.

ii) Determine the percentage redundancy

b) With a neat block diagram describe the content addressable memory.

c) prepare a detailed note on cache memory.

problem 4) Design hardwired control unit for Booths multiplication process. Show each steps clearly.

problem 5)a) Design a 4-bit, 4 functions ALU which can perform addition, subtraction, logical AND and logical OR operations

b) Describe the following terms with respect to the execution of p tasks using a q segment pipeline:

(i) Speed Up

(ii) Throughput

(iii) Efficiency

c) What are the components of Instruction Pipeline system ? describe.

problem 6) With appropriate diagram describe ISO OSI reference model in computer networks.

b) prepare a detailed note on Daisy chain interrupt handling.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96309

Have any Question? 


Related Questions in Computer Engineering

Consider these three networksa find a 3-core in the first

Consider these three networks: a) Find a 3-core in the first network. b) What is the reciprocity of the second network? c) What is the cosine similarity of vertices A and B in the third network?

Homework1 determining the format of the number to be

HOMEWORK 1) Determining the format of the number to be entered first (binary, decimal and hexadecimal) This should be done using the CheckBoxes found in the interface. - Access to the other two text boxes outside the rel ...

Assume we have a stream cipher whose period is quite short

Assume we have a stream cipher whose period is quite short. We happen to know that the period is 150-200 bit in length. We assume that we do not know anything else about the internals of the stream cipher. In particular, ...

1 assuming there are no stalls or hazards what is the

1. Assuming there are no stalls or hazards, what is the utilization of the data memory? 2. Assuming there are no stalls or hazards, what is the utilization of the write-register port of the "Registers" unit? 3. Instead o ...

Suppose a chosen-ciphertext attacker cannot recover the

Suppose a chosen-ciphertext attacker cannot recover the secret decryption key loran encryption scheme. Does this mean the encryption scheme is secure? Consider a symmetric-key cryptosystem in which cryptographic keys are ...

1 implement the sub method for the polynomial class

1. Implement the sub method for the Polynomial class implemented in the chapter. 2. The implementation of the Polynomial mul method is O(n 2 ) in the worst case. Design and implement a more efficient solution for this op ...

1 what is the clock cycle time in a pipelined and

1. What is the clock cycle time in a pipelined and non-pipelined processor? 2. What is the total latency of an LW instruction in a pipelined and non-pipelined processor? 3. If we can split one stage of the pipelined data ...

Describe the importance of information security for an

Describe the importance of information security for an organization, supporting with evidence. How could a lack of security affect not only consumers,but a company as well? Summarize two key information security practice ...

1 http version 11 defines the persistent connection as the

1. HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation\ to nonpersistent. 2. In SMTP, a sender sends unformatted ...

1 complete the implementation of the multiarray class by

1. Complete the implementation of the MultiArray class by implementing the helper method computeFactors(). 2. 1 In this chapter, we implemented the Set ADT using a list. Implement the Set ADT using a bag created from the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen