Multiplication of two 4-bit numbers

Assignment Help Basic Computer Science
Reference no: EM131002948

Question 1.  The instruction set architecture for a simple computer must support access to 64 KB of byte-addressable memory space and eight 16-bit general-purpose CPU registers.

a.  If the computer has three-operand machine language instructions that operate on the contents of two different CPU registers to produce a result that is stored in a third register, how many bits are required in the instruction format for addressing registers?

b. If all instructions are to be 16 bits long, how many op codes are available for the three-operand, register operation instructions described above (neglecting, for the moment, any other types of instructions that might be required)?

c.  Now assume (given the same 16-bit instruction size limitation) that, besides the instructions described in (a), there are a number of additional two-operand instructions to be implemented, for which one operand must be in a CPU register while the second operand may reside in a main memory location or a register. If possible, detail a scheme that allows for at least 50 register-only instructions of the type described in (a) plus at least 10 of these two-operand instructions. (Show how you would lay out the bit fields for each of the machine language instruction formats.) If this is not possible, explain in detail why not and describe what would have to be done to make it possible to implement the required number and types of machine language instructions.

Question 2. Multiplication of two 4-bit numbers (as shown in Figure 1) can be implemented as a Wallace tree multiplier (as shown in Figure 2) by using carry saver adders.

161_Diagram_1.jpg

Figure. 2 The Wallace tree multiplier for 4-bit numbers

Show Figures 1 and 2 for the following multiplication of a 5-bit number and 4-bit number:

                            a4      a3      a2   a1   a0

                                     b3      b2    b1   b0

-------------------------------------------------------------- 

Question 3: Conversion from decimal fraction to binary fraction is accomplished by multiplying the number by 2, using the integer part of the product as the next digit (and then discarding the integer). For example

        .625 × 2 = 1.25          .1(the integer part of this product is 1)

          .25 × 2 = 0.50          .10(the integer part of this product is 0)

          .50 × 2 = 1.00          .101(the integer part of this product is 1) 

So, 0.625 can be represented by .101 in binary (.101 = 1/2 + 0/4 + 1/8 = .625) 

Show how the decimal value -27.5625 would be represented in IEEE 754 single (32 bits) and double (64 bits) precision formats. (Reminder: single precision exponents are expressed in excess-127 notation, and double precision exponents are expressed in excess-1023 notation)

Reference no: EM131002948

Questions Cloud

Case study: assessment task 2 : Discuss the highest and best use principle and the relevance of the information provided by its application to the aged care home.
Unit: 401010 health variations 1 : Unit: 401010 Health Variations 1,  Explain the pathogenesis of Crohn’s disease that has led to the development of Lucy’s obstruction of the proximal ascending colon.
Preliminary work for two industry research papers : You are required to find two organisations: one large organisation with more than 5,000 employees and one small-to-medium organisation with between 50-1,000 employees.
Advanced financial accounting : You are to research the issue of using graphical representation as a means of communicating financial information, and write an essay to critically evaluate the use of graphs in financial reports with reference to the Conceptual Framework for Financi..
Multiplication of two 4-bit numbers : Multiplication of two 4-bit numbers (as shown in Figure 1) can be implemented as a Wallace tree multiplier (as shown in Figure 2) by using carry saver adders.
Determine which candidate would have won : Determine which candidate would have won if all of the preference ballots had been reversed. Does this election illustrate a violation of the reversal criterion?
What is the magnitude of the force : What is the magnitude of the force F→ on the 5.0 nC charge in the figure(Figure 1) ? What is the direction of the force F→ on the 5.0 nC charge in the figure? Give your answer as an angle measured cw from the +x-axis.
One-third of the stock of avis and best : Matthew, Kelly, and Tammy each own one-third of the stock of Avis and Best.
What are the dimensions of the banner : A small plane is flying a banner in the shape of rectagular. The area of the banner is 144 square feet. The width of the banner is 1/4 the length of the banner. What are the dimensions of the banner

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Width and distance text boxes for vertical

You are to write a software application using the Java programming language that enables a user to  design a flag. The user draws circles or ellipses, horizontal or vertical bars on the flag. The user chooses the colour, width, height and location..

  Design circuit buffer last-in first-out lifo

I want design circuit this Buffer(LIFO). This blocking is for FIFO memory but i want design circuit Buffer Last-in First-out LIFO 4*4

  You need to define the various options used in archiving

congratulations you have just been awarded a small business grant from the federal government. you and several of your

  Describe the vulnerability that the attack exploits

Describe the vulnerability that the attack exploits, including how or why the vulnerability exists, what versions of software are vulnerable. Include a technical overview of the category of vulnerability (for example, command injection, buffer ove..

  Purposes of the digital millennium copyright act?

purposes of the Digital Millennium Copyright Act?

  Create saas, paas, and iaas architectural diagrams

Describe at least three (3) items that an organization's IT / IS department should consider when an organization's strategy calls for the use of SaaS, PaaS, or IaaS

  Develop a raptor flowchart to compute the solution

Develop a Raptor flowchart to compute the solution of the equation

  Critical review

A critical review is much more than a simple summary; it is an analysis and evaluation of a book, article, or other medium. Writing a good critical review requires that you understand the material, and that you know how to analyze and evaluate tha..

  How the token buckets and wfqs can be used together

Summarize how the token buckets and WFQs can be used together to provide policing mechanisms.

  Integration of enterprise systems with inter-organizational

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  Describe the necessary formulas and sample calculations

Demonstrates your thought process and steps used to analyze the problem. Be sure to include the required input and output and how you will obtain the required output from the given input. Also, include your variable names and definitions. Be sure ..

  Public key cryptography

The format of an X.509 certificate is described in

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd