Necessary to perform a multiply using the approach

Assignment Help Basic Computer Science
Reference no: EM13928460

Textbook problems:

1. Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either the multiplicand will be added, or a zero will be. Also assume that the registers have already been initialized (you are just counting how long it take sot do the multiplication loop itself). If this is being done in hardware, the shifts of the multiplicand and multiplier can be done simultaneously. If this is being done in software, they will have to be done one after the other. Solve for each case.

2. Calculate the time necessary to perform a multiply using the approach described in the test (32 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

3. Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units.
Additional Problems
1. Use Boolean algebra to find the minimum cost SOP expression for the function below.
(??, ??, ??, ??) = ????¯?? + ???? + ??¯?? + ???? 2.
2. Use Boolean algebra to find the minimum cost POS expression for the function below.
(??, ??, ??, ??, ??) = ∏??(0,8,9,13,14)
3. Answer the following questions using the circuit in Figure 1.

a. Derive the truth table for the circuit in Figure 1.
b. Derive the Boolean expression from the truth table (not simplified).
c. Redesign the circuit so that it only uses two-input NAND gates.
4. Show how to implement the function below using a 3:8 decoder and an OR gate.
(??, ??, ??) = ∑??(0,2,3,4,5,7)
5. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer.
188
+ 371

6. Assume that the integers are signed, 2's compliment. You must perform the operation in binary and show your work. Use ten bits of precision and state whether there was an overflow - justify your answer
188
- 371
7. Assume that the integers are unsigned. You must perform the operation in binary and show your work. Use sixteen bits of precision.
188
X 64
8. Assume that the integers are unsigned. You must use hexadecimal arithmetic. Determine the result in hex, octal, and binary.
6A 94
+ 5AB1
9. Show how to divide 371 by 8 using unsigned binary division. Show the remainder, if there is one.
10. Show how to perform the operation (6 * 9) using the optimized multiplier discussed in class. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.
11. Show how to perform the operation (-6 * 9) using Booth's algorithm. Assume the operands are 5b instead of 32b (be sure that you adjust all of the registers appropriately). You must show each step, from initialization to the final product.

Reference no: EM13928460

Questions Cloud

Develop a web portal of employer-job applicants : Develop a web portal of Employer-Job Applicants Career Tracer for Royal Areas Electricity Company (RAECO).
Second stage of the consumer buying process : What is the second stage of the consumer buying process? a) Purchase decision b) Buyer satisfaction c) Information search d) Evaluation of alternatives
Information systems security : You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..
Policy monitoring and policy evaluation : Prepare a 250- to 350 word brief comparing and contrasting policy monitoring and policy evaluation. This brief is intended for a high level executive of your agency/organization, so ensure that you keep it concise and relevant
Necessary to perform a multiply using the approach : Calculate the time necessary to perform a multiply using the approach given in Figures 3.4 and 3.5 if an integer is 8 bits wide and each step of the operation takes 4 time units. Assume that in step 1a an additional is always performed - either th..
Identify risks inherent in the use of wireless : 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor's office.
Why would a warehouse be described as a necessary evil : Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.
Problem regarding the public key infrastructure : You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.
Compare civil proceedings from criminal proceedings : In a 1-3 page paper, compare and contract civil proceedings from criminal proceedings. Using at least 2 external resources, do you think class bias exists in either of these proceedings

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare the differences between mac and h-mac

Compare the differences between MAC and H-MAC.

  How many instructions executed in single time slice

Machine executed average of 5000 instructions per microseconds. How many instructions could be executed in a single time slice?

  Our model assumes that the arrival distribution of customers

In the McBurgers simulation, our model assumes that the arrival distribution of customers is the same throughout the entire day. Do you think this is a realistic assumption? If not, explain how you could modify the model to make it a better repres..

  Why globalization is good or not good for a business

Write an argumentative paper of no more than 750 words that demonstrates why globalization is good or not good for a business. The paper should define the term good, and should identify the premises and conclusions.

  Which design strategy wouldyou recommend forthe construction

Assume that you are developing a new system for a local real estate agency. The agency wants to keep a database of its own property listings and also wants to have access to the citywide multiple listings service used by all real estate agents. Which..

  What are some additional things and relationships

What are some additional things and relationships among things

  The visio diagram reflects the database design

1.  Write a one to two (1-2) page paper in which you: a.  Discuss the degree to which you believe the Visio diagram reflects the database design.   b.  Describe any assumptions that you had to make about the business rules to in order to create the V..

  What is the discovery process

1. Review questions (The length of your answer should be from roughly four or five sentences to a couple of paragraphs for each questions listed below).1) What is the discovery process and how does e-discovery fit into this process?

  How do you create a 4d array of doubles in c++

How do you create a 4D array of doubles in C++

  Difference between mass surveillance and targeted surveillan

What is the difference between mass surveillance and targeted surveillance?

  Which of the following statements are true

Which of the following statements are true? Select one or more

  Conducting vulnerability assessment and penetration test

Management is pleased with the progress that has been made, and likes the steps you have taken to set up a secured network environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd