Reference no: EM13928460
Textbook problems:
1. Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either the multiplicand will be added, or a zero will be. Also assume that the registers have already been initialized (you are just counting how long it take sot do the multiplication loop itself). If this is being done in hardware, the shifts of the multiplicand and multiplier can be done simultaneously. If this is being done in software, they will have to be done one after the other. Solve for each case.
2. Calculate the time necessary to perform a multiply using the approach described in the test (32 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.
3. Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units.
Additional Problems
1. Use Boolean algebra to find the minimum cost SOP expression for the function below.
(??, ??, ??, ??) = ????¯?? + ???? + ??¯?? + ???? 2.
2. Use Boolean algebra to find the minimum cost POS expression for the function below.
(??, ??, ??, ??, ??) = ∏??(0,8,9,13,14)
3. Answer the following questions using the circuit in Figure 1.
a. Derive the truth table for the circuit in Figure 1.
b. Derive the Boolean expression from the truth table (not simplified).
c. Redesign the circuit so that it only uses two-input NAND gates.
4. Show how to implement the function below using a 3:8 decoder and an OR gate.
(??, ??, ??) = ∑??(0,2,3,4,5,7)
5. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer.
188
+ 371
6. Assume that the integers are signed, 2's compliment. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer
188
- 371
7. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use sixteen bits of precision.
188
X 64
8. Assume that the integers are unsigned. You must use hexadecimal arithmetic. Determine the result in hex, octal, and binary.
6A 94
+ 5AB1
9. Show how to divide 371 by 8 using unsigned binary division. Show the remainder, if there is one.
10. Show how to perform the operation (6 * 9) using the optimized multiplier discussed in class. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.
11. Show how to perform the operation (-6 * 9) using Booth's algorithm. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.
Develop a web portal of employer-job applicants
: Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
|
Second stage of the consumer buying process
: What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
|
Information systems security
: You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
|
Policy monitoring and policy evaluation
: Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
|
Necessary to perform a multiply using the approach
: Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
|
Identify risks inherent in the use of wireless
: 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
|
Why would a warehouse be described as a necessary evil
: Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.
|
Problem regarding the public key infrastructure
: You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.
|
Compare civil proceedings from criminal proceedings
: In a 1-3 page paper, compare and contract civil proceedings from criminal proceedings. Using at least 2 external resources, do you think class bias exists in either of these proceedings
|