What is the largest unsigned binary number

Assignment Help Basic Computer Science
Reference no: EM131835674

Task

Question 1 - Suppose a disk drive has the following characteristics:

  • 23 surfaces
  • 512 tracks per surface
  • 64 sectors per track
  • 32 bytes/sector
  • Track-to-track seek time of 10 milliseconds
  • Rotational speed of 9600 RPM

I. What is the capacity of the drive?

II. What is the rotation delay?

III. What is the access time?

Question 2 - A digital computer has a memory unit with 32 bits per word. The instruction set consists of 232 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.

I. How many bits are needed for the opcode?

III. How many bits are left for the address part of the instruction?

IV. What is the maximum allowable size for memory?

V. What is the largest unsigned binary number that can be accommodated in one word of memory?

Question 3 - In a computer instruction format, the instruction length is 13 bits and the size of an address field is 5 bits. The system architect has already designed FIVE 2-address instructions and TWENTY 1-address instructions. How many 0-address instruction still possible to accommodate for the instruction set architecture?

Question 4 - Write code to implement the below expression:

A = (X+Y) * (Y-Z) / (X * Y) on 2, 1 and 0 address machines.

Rationale - This assessment task covers topics on CPU operation and Instruction Set Architecture, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

  • be able to investigate the internal operation of the Central Processing Unit (CPU) and describe how it is used to execute instructions;
  • be able to investigate and describe in detail the essential elements of computer organisation including internal bus, memory, Input/Output ( I/O) organisations and interfacing standards and discuss how these elements function;

Verified Expert

This assignment is based on the concepts of the core computer science from the computer architecture topic. In this given work, we have to find the seek time, delay time, access time for the given disc parameters. Also, in another task, we have to find the maximum allowable memory size and opcode and, write the code for given algebraic expression.

Reference no: EM131835674

Questions Cloud

Calculate total producer surplus : Assume a seller would be willing to accept a price as low as $100 each for 5 machines, but the buyer offers a price of $150 each, which the seller accepts.
Identification and explanation of key internal structures : Identification and explanation of the key internal structures (at least 3) that will be designed to enhance the culture within your organization.
How would you persuade official players in the us congress : how would you persuade official players in the US Congress to go along with the policies embedded in the Budget - What is your opinion on Trumps budget
Produce the minimum average total cost : Considering the scenario example of the Average Total Costs wherein the example company had three machines and determined the amount of labor
What is the largest unsigned binary number : A digital computer has a memory unit with 32 bits per word. What is the largest unsigned binary number that can be accommodated in one word of memory
Capacity on the prison systems : Will locking up dealers and users for greater sentences solve our drug problem or increase the capacity on the prison systems?
Discuss public administration concept of the iron triangle : Define and discuss the Public Administration concept of The Iron Triangle. What revenue streams are available to local, state and federal governments.
Expected yield to maturity for commercial paper : Use the following Table to answer these questions. The table provides the expected yield to maturity for commercial paper and tre
Describe benefits and disadvantages of business analytics : Describe the benefits and disadvantages of business analytics, as well as how the organization can be proactive in addressing any disadvantages.

Reviews

len1835674

1/29/2018 12:24:32 AM

The code meets the specification. Code is well documented with comments. The program produces correct outputs in every input situations. Answers are corrects. All steps are correctly shown. All codes are accurately written. Please compose the answers in a document file (doc or docx format). Please do not submit in pdf formats. Please upload the document in the Turnitin within deadline.

len1835674

1/29/2018 12:24:26 AM

The first page (cover page) of the document file should have the following information clearly mentioned: Your full name. Your Student ID. Subject Code (ITC544). Assessment item number and name (Assignment 2: MARIE & ISA). Each page should have page numbers in “page x of y” format (including the cover page). You DO NOT need to provide any references for any of the questions.

Write a Review

Basic Computer Science Questions & Answers

  An overall municipal transportation strategy

As part of an overall municipal transportation strategy, the city of Futureville has decided to implement a car sharing system. A central part of the proposed operation is a computer-based information system to manage reservations, memberships, an..

  Question regarding the hypermedia documents

Do you think hypermedia documents (or interactive multimedia in general) will eclipse certain kinds of books and other media? If so, which ones and why?

  Discuss the formation of the european union

Discuss the formation of the European Union, and the introduction of the Euro. Discuss the key legal and financial steps did they take to achieve the EU and enter into a common currency, and the challenges they faced (include a timeline).

  How to use a trigger to accomplish such a deletion

Assume that the Wedgewood Pacific Corporation will allow a row to be deleted from EMPLOYEE if the employee has no project assignments. Explain, in general terms, how to use a trigger to accomplish such a deletion.

  Responsibilities of a property owner

Consider the example in the chapter that described the responsibilities of a property owner, an architect, and a contractor when creating a new building

  Locate vendors of biometric products

Using the Web, locate vendors of biometric products. Find one vendor with a product designed to examine each characteristic mentioned in your textbook. What is the CER associated with each product? Which would be more acceptable to users? Which..

  Determine the peak pressure in terms of p

The coefficient of static friction is µs. For the solution, it is necessary to determine the peak pressure in terms of P and the bearing radius R.

  Problem regarding the console application

Explain, in your own words, what the current "Output type" selection means. If our project was created as a Console application, and the "Output Type" was set as above, give an example of a line of code that you COULD NOT use effectively, due to t..

  Describe two examples of vulnerabilities in automobiles

Describe two examples of vulnerabilities in automobiles

  Level of detail provided in the plan

Provide an example of a learning plan for an individual. This plan might be for someone you work with. Alternately, it might be for a friend or family.

  Describe scalability under no sql technologies

Describe scalability under No SQL technologies that vary widely.

  Inequality contributes to stratification of today society

Explain how racial inequality contributes to the stratification of today's society. Based on your answer, do you feel that today's society is an open or closed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd