
2.a)Consider a system which indicates which part of a laptop is damaged. There are sixpossible events here: fan damaged (F-001), keyboard damaged (K-111), speaker damaged(S-010), track-pad damaged (T-101), ethernet port damaged (E-011) and USB port damaged(U-100). Here, the first letter is the input and the three bits are the output. For example, inF-001, F is the input and001is the output. To maintain priority during the occurrence ofmultiple events at the same time, the priority sequence followed isF > K > T > E > U > S.Design an encoder that can encode the events based on given priority.You have to answerthe followings:
i) Derive the truth table of the priority encoder including valid bit.
ii) Derive the Boolean expressions for all the outputs.
b)Design a 3 bit asynchronous down counter with positive edge triggered JK Flip flops.

Step by stepSolved in 2 steps with 7 images

- In this problem we will work through a round of DES. For notational simplicity, assume it is the first round. Please enter all answers as strings of 0's and 1's. The input is the 64 bit block 0000000000000010000000000000001000000100000001000100000000000000 Suppose that the subkey for the current round is this 48 bit number: 000000000000000001000000000000000000000000000000 What does the 64 bit state look like after the IP transformation is applied to the input? 00000000000110000100000000000000 Now find Lo and Ro, the left and right halves of the state. Lo 01000000010000000000000000010000 = Ro=00000000000000100000000000000000 What is the result of applying the expansion box to R₁? E(Ro) = 00000000000000100000000000000000 What is the result of XORing the subkey with E(Ro)? k₁ E(Ro) = 00000000000000100000000000000000 We now apply the S-box transformation. S(k₁ E(Ro)) = 11011000110110001101111110111100 Finally we apply the permutation box to complete the function f. f(Ro) = P(S(k₁ + E(Ro)))…arrow_forwardwitch of the following is true When the ALU zero flag is equal to 1, this indicates that: a the ALU output is not equal to 032 b both inputs to the ALU are equal to 032 c the ALU output = 032 d at least one input to the ALU is equal to 032arrow_forwardConsider a hypothetical 8 bit floating point machine representation with a sign bit, a 3 bit exponent, and a 4 bit mantissa (se1e2e3b1b2b3b4), where the exponent bias is 3 (add 3 to exponent of number to form machine representation). Recall that actual mantissa has 5 bits, since the leading 1 is not stored on the machine. (a) What is the number ?≈2.718 in this 8-bit format? (b) What is the number that (10100111)2 represents in this 8-bit format? (c) What is the upper bound of the relative error when representing a real number in this 8-bit format?arrow_forward
- Answer the given question with a proper explanation and step-by-step solution. Consider a Hamming (7.4) code in which the parity bits are calculated according to the following equations: r0 = a0 + a1 + a2 r1 = a1 + a2 + a3 r2 = a0 + a1 + a3 The following dataword is to be coded with this scheme: format: a3 a2 a1 a0 0010 What is the parity code for the above dataword? Show it in decimal format for (r2,r1,r0); e.g. if the resulting bits are r2=1, r1=0, r0=0 (100), type the decimal equivalent of 100, which is 4.arrow_forward4, in the fixed-point machine, the following statement is wrong ( ).A. In addition to the complement, the original code and the inverted code cannot indicate that the original code of −1 B. +0 is not equal to −0C. the inverse of +0 is not equal to the negative of −0 D. For the same machine word length, the complement code can represent a negative number more than the original code and the inverted code.arrow_forwardI don't need a code for these questions. I just need them answered Nine steel specimens were submerged in seawater at various temperatures, and the corrosion rates were measured. The results are presented in the following table:Temperature (OC)Corrosion(mm/yr.)26.6 1.5826 1.4527.4 1.1321.7 0.9614.9 0.9911.3 1.0515 0.828.7 0.688.2 0.59a. Construct a scatterplot of corrosion (y) vs. temperature (x). Verify that a linear model is appropriate.b. What is the least-square line (trendline/regression line) for predicting corrosion from temperature?c. Two steel specimens whose temperatures differ by 10OC are submerged in seawater. By how much would you predict their corrosion rates differ?d. Predict the corrosion rate for steel submerged in seawater at a temperature of 20OC.e. Construct a table with predicted values from the original dataset.f. Compute the residuals. Which point has the residual with the largest magnitude?g. What is the correlation between temperature and corrosion rate? What…arrow_forward
- Write a procedure, BitComplement, which will complement each bit in the contents of the ax register. For example, after the following code fragment is executed: mov ax, 0011010111000001B call BitComplement 0011 0101 1100 0001 B then the contents of the ax register will be 1100101000111110B (1100 1010 0011 1110 B).arrow_forwardA certain animal has 13 eyes having 59.8 million pixels in each eye. Each pixel is a superposition of 5 primary colors, where each color can be one of 10,938 different intensities. What is the data rate (in GB/s to two decimal places) needed to save all that the animal sees in real time, if it "takes" 18 images per second?arrow_forwardQ6/Chose the correct answer for the output Q3 of the following circuit ( Assume that A= 1010101010, and B =1110111011 and the first bit out from the circuit is * (bit O 03 CLK CLK K 03' B. D Q2 CLK Q2' CLK Q3=1000100010 O None of them O Q3=1001000100 Q3=0010110011 Q3=1001100110arrow_forward
- Provide the correct answers to each questionarrow_forwardIn this problem we will work through a round of DES. For notational simplicity, assume it is the first round. Please enter all answers as strings of O's and 1's. The input is the 64 bit block 0000000000000100000000000100001000100000000000000000100000000000 Suppose that the subkey for the current round is this 48 bit number: 000000000000000010000000000000000000000000000000 What does the 64 bit state lok like after the IP transformation is applied to the input? Now find Ln and Ro, the left and right halves of the state. Lo =0 Ro = What is the result of applying the expansion box to Ro? E(Ro) = 0 What is the result of XORing the subkey with E(Ro)? k1 e E(Ro) = We now apply the S-box transformation. S(kı O E(Ro)) = Finally we apply the permutation box to complete the function f. f(Ro) = P(S(kı O E(Ro))) = We can now compute the state of DES going into the next round. L, =|| Rj =arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





