Necessary to perform a multiply using the approach

Assignment Help Basic Computer Science
Reference no: EM13928460

Textbook problems:

1. Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either the multiplicand will be added, or a zero will be. Also assume that the registers have already been initialized (you are just counting how long it take sot do the multiplication loop itself). If this is being done in hardware, the shifts of the multiplicand and multiplier can be done simultaneously. If this is being done in software, they will have to be done one after the other. Solve for each case.

2. Calculate the time necessary to perform a multiply using the approach described in the test (32 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

3. Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units.
Additional Problems
1. Use Boolean algebra to find the minimum cost SOP expression for the function below.
(??, ??, ??, ??) = ????¯?? + ???? + ??¯?? + ???? 2.
2. Use Boolean algebra to find the minimum cost POS expression for the function below.
(??, ??, ??, ??, ??) = ∏??(0,8,9,13,14)
3. Answer the following questions using the circuit in Figure 1.

a. Derive the truth table for the circuit in Figure 1.
b. Derive the Boolean expression from the truth table (not simplified).
c. Redesign the circuit so that it only uses two-input NAND gates.
4. Show how to implement the function below using a 3:8 decoder and an OR gate.
(??, ??, ??) = ∑??(0,2,3,4,5,7)
5. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer.
188
+ 371

6. Assume that the integers are signed, 2's compliment. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer
188
- 371
7. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use sixteen bits of precision.
188
X 64
8. Assume that the integers are unsigned. You must use hexadecimal arithmetic. Determine the result in hex, octal, and binary.
6A 94
+ 5AB1
9. Show how to divide 371 by 8 using unsigned binary division. Show the remainder, if there is one.
10. Show how to perform the operation (6 * 9) using the optimized multiplier discussed in class. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.
11. Show how to perform the operation (-6 * 9) using Booth's algorithm. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.

Reference no: EM13928460

Questions Cloud

Develop a web portal of employer-job applicants : Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
Second stage of the consumer buying process : What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
Information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
Policy monitoring and policy evaluation : Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
Necessary to perform a multiply using the approach : Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
Why would a warehouse be described as a necessary evil : Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.
Problem regarding the public key infrastructure : You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.
Compare civil proceedings from criminal proceedings : In a 1-3 page paper, compare and contract civil proceedings from criminal proceedings. Using at least 2 external resources, do you think class bias exists in either of these proceedings

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why information security is not factor for organization

But would not require to give for information security on those systems. Explain that environment and desribe why information security is not factor for that organization.

  The small publishing company

The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database?

  Give pseudocode to reconstruct an lcs from completed c table

Give pseudocode to reconstruct an LCS from the completed c table and the original sequences X = and Y = in O(m+n) time, without using the b table. Do this by writing a modified version of PRINT-LCS?

  Define fixed size instructions and varying size instructions

What are the advantages and disadvantage of fixed size instructions and varying size instructions?

  Explaining multiple client computers and servers

In network with multiple client computers, servers, switches and wireless access points, write down resources must be scanned for possible vulnerabilities.

  Find the mean delay e(t) and the average wait time e(w)

Consider a statistical multiplexer (or a data concentrator) in which the input packets from terminals connected to it are merged in order of arrival in a buffer and are then read out first come-first served over an outgoing transmission link. ..

  Family reliant on wood products from the forest

You have moved to a small village in a developing country. The people in this village rely on the nearby forest for the wood they use for cooking. The forest officially is a park and should not be harvested, but there are very few park rangers, and m..

  How the american government

How the American Government was in the past utilized the force of the military to accomplish American objectives?

  Design a finite state machine similar to a 3 bit counter

design a finite state machine similar to a 3 bit counter. in this case you will have 3 bits of state which you can think of as a 3 bit unsigned number, but this time the counter must count by 3s--the sequence it goes through should be 0, 3, 6, 1, ..

  Describe the necessary hardware and software components

Your company wants to create an application that allows employees to dial in from a remote location and, using a single connection, access their voice mail, e-mail, and data files.

  What is the command to list files in a directory

It will move the contents of temp1 from directory temp to temp1 of current directory and when finished it will erase the contents of temp1 of temp directory. What kind of files will be matched

  How does one convert logical data to numerical data

How does one convert logical data to numerical data? And I know it is not the real function, because that just finds the real part of a complex value.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd