Find the code memory address size

Assignment Help Basic Computer Science
Reference no: EM131073686

A computer uses a 9-bit instruction and should have enough memory for 4,096 instructions. The computer should have data memory of 8,192 bytes.

Part a) Using a Harvard design, find the code memory address size, the data memory address size and the total memory size in bits.

Part b) Using a von Neumann design, find the memory address size and the total memory size in bits.

Part c) What is the difference in the memory size between the two approaches? How do you make sense of this value?

Reference no: EM131073686

Questions Cloud

Positive and negative incentives for compliance : Class, there are both positive and negative incentives for compliance; we have talked primarily about negative incentives (fines, negilgence lawsuits, jail time).
Computer maintains memory alignment : Part a) A computer maintains memory alignment. At what addresses can we store a byte variable? What about a 16-bit variable? Part b) A computer maintains memory alignment. Show how the variables below are stored in the memory if they have to be sto..
Examine the fate of nox as the air parcel ages : Consider an air parcel ventilated from a city at time t=0 and subsequently transported for 10 days without exchanging air with its surroundings. The air parcel contains initially 100 ppb NOx. We wish to examine the fate of NOx as the air parcel ag..
Little endian configurations : Part a) Explain the Big Endian and the Little Endian configurations. Part b) Show how the data (0x12AB) is stored at address 100 in either of the configurations.
Find the code memory address size : Part a) Using a Harvard design, find the code memory address size, the data memory address size and the total memory size in bits. Part b) Using a von Neumann design, find the memory address size and the total memory size in bits.
What is the total size of the memory : Part a) A memory is byte addressable and has a 12-bit address. All the addresses are valid. What is the total size of the memory?
Local area network solution : A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconn..
Simple algorithm to find all prime numbers : Eratosthenes sieve The Eratosthenes sieve is a simple algorithm to find all prime numbers less than a given number.
Sketch a parabola that models a real-life situation : Sketch a parabola that models a real-life situation and describe what the vertex represents. Determine reasonable domain and range values for this type of situation

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the concept of concurrency

Write 2 pages.Describe the concept of concurrency. Use examples to discuss how concurrency is used in distributed enterprise systems and why concurrency is important in these scenarios.

  Write a version of sum pairs i that sums each component

Using SML write a version of sumPairs that sums each component of the pairs separately, returning a pair consisting of the sumof the first components and the sum of the second components

  How convert floating number ieeee half floating point number

How to convert 2.51 and 5.25 to IEEEE Half Floating Point Number

  How volvo car corporation transforms data into knowledge

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  Create a fraction struct that has a numerator

Create a fraction struct that has a numerator and a denominator. Make an overloaded operator + for the struct that can add two fractions and return a fraction result. Make a overloaded

  Cryptography for standardized regulated and mandated

Whose interests are most significant when finding extent to which cryptography must be standardized, regulated, and mandated?

  Show that every n node binary search tree is not equally lik

Show that every n-node binary search tree is not equally likely (assuming items are inserted in random order), and that balanced trees are more probable than straight-line trees.

  These function prototypes lack parameters

These function prototypes lack parameters; add whatever parameters you feel are necessary so that the program works without global variables. The program's output should reflect the bus's actions by reporting each change in state, along with the n..

  Explain modern technology now embrace some technologies

Ten years ago there were still organizations that did not rely upon computer technology. These included small businesses that still took cash or checks and were not set up to handle credit or debit cards.

  Cubic maximum subsequence sum algorithm performs

The inner loop of the cubic maximum subsequence sum algorithm performs N(N+1)(N+2)/6 iterations of the innermost code. The quadratic version performs N(N + 1)/2 iterations.

  Throughout this course you have been asked to research and

throughout this course you have been asked to research and respond to various ethical dilemmas and regulations that

  Describe basic elements of embedded control system

Describe the basic elements and operation of the chosen embedded control system - Examine the robust control methods which could be used for increasing the performance and energy efficiency of the chosen embedded control system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd