Does the marie architecture owe more to aiken

Assignment Help Computer Engineering
Reference no: EM13924278

Homework

Before starting this homework assignment, please be sure that you have completed all of the following activities.

• View the relevant online lectures and read associated sections in the textbook before or while you work on this homework assignment.
• Review the course syllabus. Note the grading policies, including policies for submitting assignments.
• Review the course schedule. Note the due dates for course assignments, including this one.
• Review the Graduate Honor System at https://ghs.graduateschool.vt.edu. Review the Graduate Honor System Constitution at https://ghs.graduateschool.vt.edu/ghs_constitution.html, especially Articles I (Sections 1, 2, and 3), V, VI, VII, VIII, and IX.

Please note the following.

• Solutions must be clear and presented in the order assigned. Solutions must show work needed, as appropriate, to derive your answers. Written answers should be concise, but sufficiently complete to answer the question. Neat hand drawings, where needed, are acceptable. Your final solution for each problem must be easily identified.

• At the top of the first page, include: your name (as recorded by the university); your email address; and the assignment name ("ECE 4500, Homework 3"). Do not include your Virginia Tech ID number or your social security number.

• Homework must be submitted as a PDF (.pdf) file with the file name lastname_firstname.pdf, where lastname is your last or family name and firstname is your first or given name. Submit a single file.

This homework consists of the following problems. Problems are from L. Null and J. Lobur, The Essentials of Computer Organization and Architecture, 3rd edition, Jones and Bartlett Learning, 2012 (ISBN 9781449600068) unless otherwise noted. The problems from the textbook are from the Exercises section of Chapter 4 (pages 260-267).

1. Do Exercise 5. (For part b, assume a 16-bit word.)
2. Do Exercise 8.
3. Do Exercise 12.

4. Section 4.10 of the text provides an example of the execution of a simple MARIE program. For this problem, you are to complete a similar example for a different program. In particular, for the MARIE program given below, you are to complete the equivalent of Figure 4.14, but for the program below. You do not need to show how the "Halt" instruction is executed. Specify values in PC, IR, MAR, MBR, and AC in hexadecimal. A template for your answer is provided as a Microsoft Word file that is included with this assignment on Scholar. You are to incorporate your answer for this problem into your submission for the homework assignment so that you submit only one PDF file for the entire assignment.

The program is as follows. Note that this table is the equivalent of Table 4.3 in the textbook, only for a different program.

Hex Address

 

Instruction

Binary Contents of Memory Address

Hex Contents of Memory

100

Load      105

0001 0001 0000 0101

1105

101

Subt      104

0100 0001 0000 0100

4104

102

Store     104

0010 0001 0000 0100

2104

103

Halt

0111 0000 0000 0000

7000

104

00A3

0000 0000 1010 0011

00A3

105

00F3

0000 0000 1111 0011

00F3

5. Scavenger Hunt: Two pioneers of early computers and computer organization were Howard H. Aiken and John von Neumann. Answer the questions below regarding Aiken and von Neumann. Cite sources used for your answers.

a. Is Aiken or is von Neumann associated with the so-called Princeton architecture?

b. Is Aiken or is von Neumann associated with the so-called Harvard architecture?

c. What is the key feature of a Princeton architecture computer compared to the Harvard architecture?

d. Does the MARIE architecture owe more to Aiken or von Neumann? Briefly justify your answer.

Reference no: EM13924278

Questions Cloud

Difference between a company assets and liabilities : 1. The rule that requires financial statements to reflect the assumption that the business will continue operating instead of being closed or sold, unless evidence shows that it will not continue, is the: 3. The difference between a company's asset..
What are the major threats in the external environment : What would a SWOT analysis of your university look like? What are your school's key strengths and weaknesses? What are the major threats in the external environment? What are the opportunities? Make a list of all you can think of.
Best fit line in scatter plot of regression analysis : How would you define "the best fit line" in scatter plot of regression analysis?
Compare and contrast the differences among the states : How this is affecting the courts, and what courts are discussing to try to deal with this situation. Why was a certain time period chosen? Is it effective? How are the courts dealing with this? Are there any problems with the statutes? Provide as..
Does the marie architecture owe more to aiken : Two pioneers of early computers and computer organization were Howard H. Aiken and John von Neumann - Is Aiken or is von Neumann associated with the so-called Princeton architecture?
Measurable or observable characteristics : This preparation process involves looking at the characteristics of the receivers of the sender's message.
What were the environmental and human health consequences : Provide a brief history of RCRA and what aspects of waste it regulates. What was the cause of the incident? What types of waste were involved? What were the environmental and human health consequences
Is the performance for firms within an industry consistent : Is the performance for firms within an industry consistent? What is the implication of these results for industry and company analysis?
Explain how extremophiles represent of those organisms : In this discussion, please present your view of the early conditions on earth that might have affected the traits of organisms living in that environment and how life may have formed.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Question1amanda white has started a domestic cleaning

question1amanda white has started a domestic cleaning business spotless view cleaning svc.she started the business on

  Compare two architectural styles

Consider their flexibility, how easy they are to understand and use, and quality of applications they might  produce. Discuss any experiences you have had using these patterns. How has your prior training and preparation influenced your evaluation..

  This assignment has two partsnbsp part 1 is short answer

this assignment has two parts.nbsp part 1 is short answer discussion question that must all of the requirements below

  Question1 add following 16-bit 2s complement numbers

question1 add following 16-bit 2s complement numbers represented in hex assume word size of computer is 16 bits - fe59

  Question1 use big-theta notation to classify traditional

question1. use big-theta notation to classify traditional grade school algorithms for addition and development. that is

  What exactly does it mean to be ethical

What exactly does it mean to be ‘ethical'? You might think something along the lines of ‘treat others the way you want to be treated' or ‘be a good person'.

  Write a program that inputs an integer for n

Write a program that inputs an integer for n, iterates through the Babylonian algorithm twenty times, and outputs the answer as a double to two decimal places. Your answer will be most accurate for small values of n.

  Write down a program that reads a social security number

Write down a program that reads a social security number written as contiguous digits (for instance, 509435456), uses the charAt method to obtain each character and then prints each digit on a separate line followed by a colon and the digit printe..

  Task 1you are required in your new role as an enterprise

task 1you are required in your new role as an enterprise architect ea to do a swot analysis of a current ict servicein

  Explain how could a trusted computing base tcb function in

the bloom design group similarly to other company which uses computer systems in day to day functions would

  How to create a coke machine program in c++

We would start by having the users insert their money. Since they can not physically insert the money, we will just ask them how much they wish to insert and we will keep track of how much money they have inserted.

  Matlab quad function

The root-mean-square current can be determined as I rms = (1/T int (i^2(t) dt) |from 0 to T )^1/2 rms utilizing the MATLAB quad function.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd