Calculating total addressing capacity of computer system

Assignment Help Basic Computer Science
Reference no: EM13829395

Problem:

A computer system uses 20-bit address bus and can address an 8-bit wide memory. The memory of this computer system contains 2 × 32 Kbytes ROM (ROM1, ROM2) and 2 × 16 Kbytes of RAM (RAM1 & RAM2). The memories are ordered in an interlaced manner - ROM1, RAM1, ROM2, and RAM2 and form a contiguous block of memory starting at address 0. The rest of the address range after RAM2 is not used.

(a) Calculate the total addressing capacity of this computer system, including the unused memory zone.

(b) Draw a memory map for the computer system. Indicate the starting and ending addresses in hexadecimal for each block of memory and any unused space. Show how the memory addresses are obtained.

Additional Information:

The question is from Computer Science and it explains about calculating the total addressing capacity of a computer system including unused memory zone.

Reference no: EM13829395

Questions Cloud

What are the firms average and marginal taxes : Corporate income tax/ Meyer Inc has taxable income (earnings before taxes) of 300,000. Calcualte Meyer's federal income tax liability using the tax table . What are the firm's average and marginal taxes?
How large per share common stock divedend : Figurate Industries has 750,000 shares of cumulative preferred stock outstanding. It has passed the last three quarterly dividends of $2.50 per share and now (at the end of the current quarter) wishes to distribute a total of $12 million to its share..
Types of memories that are non-volatile : Name and describe any four (4) different types of memories that are non-volatile.
Bonds will greatest percentage decrease in value : Which of the following bonds will have the greatest percentage decrease in value if all interest rates increase by 1 percent?
Calculating total addressing capacity of computer system : A computer system uses 20-bit address bus and can address an 8-bit wide memory. The memory of this computer system contains 2 × 32 Kbytes ROM (ROM1, ROM2) and 2 × 16 Kbytes of RAM (RAM1 & RAM2).
Scenario: improving work culture in an organization : Scenario: Improving Work Culture In An Organization
Initiated a new corporate strategy : Brash Corporation initiated a new corporate strategy that fixes its annual divedend at $2.25 per share forever. If the risk free rate is 4.5% and the risk premium on Brash's stock is 10.8%, what is the value of Brash's stock?
Foundation principle of the employment relationship : The class began with a discussion of at-will employment being the foundation principle of the employment relationship. The rest of the course complicated this principle by providing numerous exceptions. Based on your reading throughout the course, pr..
Expressing the values of x and y in binary : Given X = B6 E1 16 and Y = 1C 7D16; where X & Y are 16 bit numbers.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining responsibility ofconfidentiality to employer

Describe what you must do in such a situation. You know that cost to your present employer will increase if ambiguities are not resolved. Though, you also have a responsibility of confidentiality to previous employer.

  An analysis of the security issues associated with batch fil

For this writing assignment you will be required to provide an analysis of the Security issues associated with batch files, Visual Basic and other forms of scripting.

  Create a four-function fraction calculator

Create a four-function fraction calculator. Here are the formulas for the four arithmetic operations applied to fractions.

  Data governance improvements

Data Governance Improvements

  Write the string to the ofstream

Close the ifstream and ofstreams when finished. 9. Make sure that your program allows the user to encrypt / decrypt more than one file per session. This means adding a loop which allows the entire program to repeat until the user has nothing more ..

  Discuss why the user needs are important or stood out

Cite specific examples from readings. Include personal experience with the topic if appropriate

  Using both printed material and online resource

Using both printed material and online resource

  Write statement which outputs num-cost to standard output

Write single statement which outputs num and cost to standard output. Print both values (num first, then cost), separated by a space on a single line.

  Facebook''s acquisition of whatsapp was a way for zuckerberg

Facebook's acquisition of WhatsApp was a way for Zuckerberg's firm to gain leadership in the fast-growing mobile messaging market.

  Write an instruction sequence to add

Write an instruction sequence to add the 3-byte numbers stored in memory locations 0x1 1-0x13 and 0x14-0x16 and save the sum in memory locations 0x20-0x22

  Discuss any two major security flaws in us or anywhere

Discuss any two major security flaws in US or anywhere, one of which is a violation of Integrity, while the other is a violation of Confidentiality, with clear explain.

  Dos attacks exist for which part of the osi protocol stack

DoS attacks exist for which part of the OSI protocol stack?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd