Ask Question, Ask an Expert


Ask Computer Engineering Expert

Answer all the problems


(a) Convert the following numbers as asked:                   

(i) Decimal 999 to Hexadecimal

(ii) Octal 555 to Hexadecimal

(iii) Hexadecimal AAAA to Decimal

(iv) Hexadecimal AAAA to Octal                   

(b) Suppose that computer represents negative integers in signed 2’s complement notation having the size of 8 bits. You might also suppose that all registers used for integer arithmetic are of 8 bits. Carry out the following operations using this computer (numbers indicated in the operations are decimal numbers). Indicate overflow condition, if any.

(i) Add -38 and -90

(ii) Subtract 90 from 38

(iii) Add 63 and 65

(iv) Subtract -90 from -65                   

(c) A four bit data 0001 is to be sent across communication channel. What must be the parity bits for SEC code, if this data is to be sent correctly across to destination? Indicate where these SEC code bits would be placed in the data + code bit combination which is to be sent. Suppose that data bits which were received were 1 S 0 S 0 S 1 (SEC bits remained unchanged in between wherever they were, that is the value of S might the related SEC bit or Null ). Correct this code using SEC bits generated at the receiver and the SEC bits received from the sources. Demonstrate all the steps of this process.                               

(d) A logical function calculator compares two numbers for the function A >= B. The comparator output 1 of the comparison is TRUE else FALSE. In case if both A and B are equal, the comparator outputs a second bit as 1 (0 otherwise). Partial truth table for comparator is given in Figure :

 Number A       Number B           Output
Bit 1   Bit 0     Bit 1    Bit 0    Same    Zero
0         0          0          0        1          1
0         0          0          1        0          0
...        ...        ...          ...       …         …
0         1         0           0        1         0
0         1         0           1        1         1
...        ...        ...         ...        …         …
1         0         1           1        0          0
1         1         1           1        1          1

Complete the truth table and design and draw the combinational circuit using AND-OR-NOT gates for the description given.       

(e) Why do you require a flip-flop? Describe characteristics table of J K flip flop. How is it different than that of S R flip flop? Describe synchronous counter in the context of change of states of the flip flop.   

(f) What is associative memory? Describe with the help of the diagram. What is a Cache memory? What are its different organisations? Describe Associative cache memory organization with the help of a diagram showing mapping from main memory to cache memory. You should show proper addresses for both the memories in the diagram. Though, for simplicity, you might take size of the main memory as 32 byte and cache as 4 byte.               

(g) You have been asked to design the configuration of a database server (please do not give the names of manufacturer), specifically the RAID configuration for your server. Which of type of RAID machine will you select? Give justification in support of your answer. Also describe the process of interrupt handling when more than one interrupts can occur simultaneously.           

(h) Describe the functions and purposes of Direct Memory Access (DMA) and Input/output processor in Computer. Determine how in Pentium processor I/O devices are connected to the system bus.   


(a) Is it possible to have Instruction set with no operands at all? Justify your answer. Suppose that the machine is to be designed for performing simple arithmetic operations (including unary and binary), what must be optimum number of operand in an instruction set for such machine? Give justification in support of your answer. How does the number of operand addresses in the Instruction Set affect the size of the program on computer?       

(b) A machine is to be designed such that it stores arbitrary length arrays in memory. This machine also supports subroutine calls. Suggest four best addressing modes for the machine. Give reasons for your choice.        

(c) Consider instruction ISNZ Op where Op is a register operand which is the address of the instruction of the executing program. Instruction checks if the value of the preceding instruction execution is NOT ZERO (the result might be in the AC register), if so then it branches to address specified by the Op. prepare sequence of micro-operations which would be needed to execute this instruction. You might use various micro-operation cycles and the essential registers.

(d) Suppose that 8-bit Register R has the data 01101110. Perform the following operations on the register R:     

(i) Selective Set the lower 4 bits to 1100

(ii) Extract the lower 4 bits

(iii) Clear the register using a logical operation

(iv) Insert a value 1111 in the lower 4 bits of the register.       

(e) Represent the following floating point numbers using IEEE 754 floating point single precision format.

i. 32.0125

ii. -0.125       

(f) Describe the working of the control unit of a computer with the help of a Block diagram. Describe significance of micro-instruction in computer. Describe differences between horizontal and vertical microinstructions.     


(a) prepare the advantages of having segments in 8086 micro-processor? Describe the use of stack segment register and process of computations of physical address of the top of the stack in 8086 microprocessor.             

(b) Describe the REPE, CMPS, AAA, and  XLAT instructions of 8086 processor with the help of one ex each.   

(c) Describe any one direct, one register indirect, one based indirect and one indexed indirect addressing modes of 8086 microprocessor with the help of the ex of each.     

(d) Describe process of Input/output using Interrupt 21h in 8086 microprocessor with the help of exs.   

(e) prepare program in 8086 assembly language which finds total of an array of maximum 10 integer elements. You might suppose that array is stored in memory and last value in the array is -2000. The find outd result is stored in location named sum.     

(f) prepare program in 8086 assembly language which passes two input parameters to the subroutine through stack. Subroutine return value 1 if the value of first parameter is greater than the second, otherwise returns 0. Make appropriate assumptions, if any.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92317

Have any Question? 

Related Questions in Computer Engineering

1 if the drain and gate supply voltages are dropped to 06v

1. If the drain and gate supply voltages are dropped to 0.6V and the oxide reduced to 40A as indicated by a recent (1989-1990)IBM 0.1-micron Si nMOST at 77K, compute the device parameters required in Table 662.1. Discuss ...

When people describe client-server architecture they are

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain.

Repeat 4164 but now your predictor should be able to

Repeat 4.16.4, but now your predictor should be able to eventually (after a warm-up period during which it can make wrong predictions) start perfectly predicting both this pattern and its opposite. Your predictor should ...

1 prove or show that the worst case time of the extraction

1. Prove or show that the worst case time of the extraction operation on a heap implemented as an array is O(log n). 2. Prove or show that the insertion and extraction operations on a heap implemented as a Python list is ...

Grids uses a hierarchy of directors to analyze data each

GrIDS uses a hierarchy of directors to analyze data. Each director performs some checks, then creates a higher-level abstraction of the data to pass to the next director in the hierarchy. AAFID distributes the directors ...

1 which management groups are responsible for implementing

1. Which management groups are responsible for implementing information security to protect the organization's ability to function? 2. Has the implementation of networking technology created more or less risk for busines ...

Assume we store a one-time key on a cd-rom with a capacity

Assume we store a one-time key on a CD-ROM with a capacity of 1 Gbyte. Discuss the real-life implications of a One-Time-Pad (OTP) system. Address issues such as life cycle of the key, storage of the key during the life c ...

300 words each point pleaseexplain the origins of the us

300 words each point please. Explain the origins of the U.S. judicial system and how the judicial system impacts and affects businesses. Discuss the concept of judicial review. Describe the different forms of Alternative ...

Assume now that you have two friends that will help you

Assume now that you have two friends that will help you cook, and that you have a large oven that can accommodate all three cakes. How will this change the schedule you arrived at in Exercise 6.2.1 above? Exercise 6.2.1 ...

Design an algorithm that accepts as input a decimal number

Design an algorithm that accepts as input a decimal number and converts it to the binary-coded decimal (bcd) representation. In the bcd scheme each digit is represented by a 4-bit binary code.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen