Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) With neat block diagram describe the working of the first general purpose computer

b) Consider an assignment statement X = (a - b * c)/d where a, b, c, d and X are the main memory locations. prepare a set of instructions to implement the above assignment statement on:

i) Accumulator based machine and

ii) Stack oriented machine.

iii) General register machine using two address instructions

problem 2)a) Perform (-88)10*(-44)10 using Booth’s algorithm.

b) Perform (100)10÷ (15)10 using Non Restoring division algorithm. Also draw the flow chart.

problem 3)a) Certain processor needs seven instructions (I0 to I6) whose relative frequency of occurrence is as shown below:

Instruction           I0           I1           I2            I3            I4          I5           I6
Rel. Frequency   0.05        0.1         0.4        0.18         0.2       0.04       0.03

i) Develop the Huffman's tree and design appropriate OPCODE for each instruction.

ii) Determine the percentage redundancy

b) With a neat block diagram describe the content addressable memory.

c) prepare a detailed note on cache memory.

problem 4) Design hardwired control unit for Booths multiplication process. Show each steps clearly.

problem 5)a) Design a 4-bit, 4 functions ALU which can perform addition, subtraction, logical AND and logical OR operations

b) Describe the following terms with respect to the execution of p tasks using a q segment pipeline:

(i) Speed Up

(ii) Throughput

(iii) Efficiency

c) What are the components of Instruction Pipeline system ? describe.

problem 6) With appropriate diagram describe ISO OSI reference model in computer networks.

b) prepare a detailed note on Daisy chain interrupt handling.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96309

Have any Question? 


Related Questions in Computer Engineering

1 a periodic composite signal contains frequencies from 10

1. A periodic composite signal contains frequencies from 10 to 30 KHz, each with an amplitude of 10 V. Draw the frequency spectrum. 2. A nonperiodic composite signal contains frequencies from 10 to 30 KHz. The peak ampli ...

1 which signal has a wider bandwidth a sine wave with a

1. Which signal has a wider bandwidth, a sine wave with a frequency of 100 Hzvb or a sine wave with a frequency of 200 Hz? 2. What is the bit rate for each of the following signals? a. A signal in which 1 bit lasts 0.001 ...

1 what is the difference between throwing an exception and

1. What is the difference between throwing an exception and catching an exception? 2. What is a checked exception? What is an unchecked exception? Is a NullPointerException checked or unchecked? Which exceptions do you n ...

1 assuming that the l1 hit time determines the cycle times

1. Assuming that the L1 hit time determines the cycle times for P1 and P2, what are their respective clock rates? 2. What is the Average Memory Access Time for P1 and P2? 3. Assuming a base CPI of 1.0 without any memory ...

In a tcp connection the initial sequence number at the

In a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the connection. What is the v ...

In the original fire simple model when the density is set

In the original Fire Simple model, when the density is set to 50 percent, there are roughly an equal number of green patches (trees) and black patches (empty space). Many people guess that at that density the fire would ...

1 discuss two security mechanisms applied at the

1. Discuss two security mechanisms applied at the application layer. Are they safer than those applied at the lower network layer? Support your response. 2. Are there security mechanisms applicable at transport layer? Is ...

Write your own bitarray class without inheriting from the

Write your own BitArray class (without inheriting from the BitArray class) that includes a conversion method that takes Boolean values and converts them to bit values. Hint: use a BitArray as the main data structure of t ...

1 how does technological obsolescence constitute a threat

1. How does technological obsolescence constitute a threat to information security? How can an organization protect against it? 2. Does the intellectual property owned by an organization usually have value? If so, how ca ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro