Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

How can you transform 6 bit Op-code to 18 bit control memory address? justify your answer with the help of examples?

What are the various areas where Artificial Intelligence can be used?


What do you understand about Artificial Intelligence?


create a mechanism that hides information in the form of a cryptogram or cypher.

Requirements

  • Step 1: Think about an encoding/decoding scheme regarding the message you are attempting to hide.
  • Step 2: Illustrate how you would hide (conceal) the actual text/message.
  • Step 3: Illustrate this by an example capturing the Before/After state (i.e., the secret message in terms of a representation/mapping of data).

A processor accesses main memory with an average access time of T2. A smaller cache memory is interposed between the processor and main memory. The cache has a significantly

faster access time of T1<T2. The cache holds, at any time, copies of some main memory words

and is designed so that the words more likely to be accessed in the near future are in the cache. Assume that the probability that the next word accessed by the processor is in the cache is H, known as the hit ratio.

a. For any single memory access, what is the theoretical speedup of accessing the word in the cache rather than in main memory?

b. Let T be the average access time. Express T as a function of T1 , T2, and H. What is the

overall speedup as a function of H?


Using an appropriate diagram:


4. Discuss Gates & Flip Flops in Microprocessors

Using an appropriate diagram:


Differentiate between Moore finite state machine and the mealy


finite state machine

Using an appropriate diagram:


2. Apply the traffic lightning system to describe the term finite state


machine

Using an appropriate diagram:


1. Apply the fetch, decode & execute machine cycle to explain


pipelining and parallelism in the context of computing

a) Write an assembly program using MARIE's assembly Instruction set that prompts the user to enter a non-negative integer that is less than 10. The program should include a subroutine that keeps prompting until a valid value is obtained. When a valid number is entered, it will be displayed. (Hint: Use JNS & JUMPI instructions to implement the subroutine)

N.B: You should include the MARIE code in your Answer, with an explanation of each instruction in your code beside it. Example: Subt One /Subtract 1 from AC

b) Add a screenshot of the simulation, showing the result (A screenshot of the MARIE Simulator window after running the program). Instructions: - Use “ORG” instruction to start your program at address equivalent to 25610. - Use your last university ID number to input the value of X. For example, if your ID is1915161678234, then you will use the number 4 as the value of x. - Do not forget to change the representation of the Input and Output windows in the simulator to Decimal. 


LATEST TUTORIALS
APPROVED BY CLIENTS