Necessary to perform a multiply using the approach

Assignment Help Basic Computer Science
Reference no: EM13928460

Textbook problems:

1. Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either the multiplicand will be added, or a zero will be. Also assume that the registers have already been initialized (you are just counting how long it take sot do the multiplication loop itself). If this is being done in hardware, the shifts of the multiplicand and multiplier can be done simultaneously. If this is being done in software, they will have to be done one after the other. Solve for each case.

2. Calculate the time necessary to perform a multiply using the approach described in the test (32 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

3. Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units.
Additional Problems
1. Use Boolean algebra to find the minimum cost SOP expression for the function below.
(??, ??, ??, ??) = ????¯?? + ???? + ??¯?? + ???? 2.
2. Use Boolean algebra to find the minimum cost POS expression for the function below.
(??, ??, ??, ??, ??) = ∏??(0,8,9,13,14)
3. Answer the following questions using the circuit in Figure 1.

a. Derive the truth table for the circuit in Figure 1.
b. Derive the Boolean expression from the truth table (not simplified).
c. Redesign the circuit so that it only uses two-input NAND gates.
4. Show how to implement the function below using a 3:8 decoder and an OR gate.
(??, ??, ??) = ∑??(0,2,3,4,5,7)
5. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer.
188
+ 371

6. Assume that the integers are signed, 2's compliment. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer
188
- 371
7. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use sixteen bits of precision.
188
X 64
8. Assume that the integers are unsigned. You must use hexadecimal arithmetic. Determine the result in hex, octal, and binary.
6A 94
+ 5AB1
9. Show how to divide 371 by 8 using unsigned binary division. Show the remainder, if there is one.
10. Show how to perform the operation (6 * 9) using the optimized multiplier discussed in class. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.
11. Show how to perform the operation (-6 * 9) using Booth's algorithm. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.

Reference no: EM13928460

Questions Cloud

Develop a web portal of employer-job applicants : Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
Second stage of the consumer buying process : What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
Information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
Policy monitoring and policy evaluation : Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
Necessary to perform a multiply using the approach : Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
Why would a warehouse be described as a necessary evil : Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.
Problem regarding the public key infrastructure : You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.
Compare civil proceedings from criminal proceedings : In a 1-3 page paper, compare and contract civil proceedings from criminal proceedings. Using at least 2 external resources, do you think class bias exists in either of these proceedings

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd