1. Use the mesh-current method to nd how much power the dependent source developed in the
3g- gn 2;;331 4 . I
\ V ' -' 5" \ 1 .3 f 5)
, 5. /(JA./)-M ~
d4 4 51.54 (Us 4 . ,3 J ( _ .
" : / ! v C.) x 'J
=> bx, 4 2; ' 2"3
T -4 4 O 5 20
ECE3210 Microprocessor Engineering - Practice Exam1
1. (20 pts) Assume the 80386 is running in protected mode with the state given below.
DS = 0010 H
ESI = 00001202
EBP = 0000FC4
Global Descriptor Table
ECE2100 Circuit I. Fall 2016
.Work on all exam pages.
.Closed books and notes.
.You must solve each problem by following instructions (if there is any) to receive
Group 8: Applications
OR Plant safety
AND Measurement of a frequency
NOT CMOS inverters
Understanding a circuit
Katz, Randy H., and Gaetano Borriello. Contempor
ECE3220 Lab1 Introduction and C programming basics
In lab 1, it is important for student to get familiar with the Linux lab setup. We should
learn to use eclipse and gedit to edit the code, run the terminal and ge
In class assignment
Study the piece of code L3_InClassAssignment.c.
What do you think will be printed to the screen
when the program runs? Write down your
answers (before running the program).
Point out all implicit type conversions and
Lecture 7: Pointers and Arrays
A pointer is a variable that contains the
address of a variable.
The & operator gives the address of an
The * operator is the dereferencing
operator that accesses the value a pointer
Lecture 1: Windows, Notepad+, Cygwin,
Demo (in class)
Check if Cygwin and Eclipse have
Lecture 1: Linux, vi, kwrite, gcc, Eclipse,
Demo (in the lab)
Lecture 1: Language Translation
Translators: needed to be able to u
Lecture 9: Memory Leaks and Fragmentation
When users do not free dynamically allocated memory when done with it.
The amount of available memory may become insufficient.
void myFunction(void) cfw_
float *a = malloc(10*sizeof(float);
Lecture 5: Binding, Scope and the Symbol Table
Recall: binding is the process of associating an attribute to a name.
Bindings must be maintained by a translator so that the appropriate
meanings are given to names during translation and execution. This is
Lecture 13: Inheritance in C+
Previously, we discussed data abstraction and
encapsulation as they relate to object oriented
programming. Another key concept in OOP is
Inheritance makes it easier to extend previous code
Lecture 4: The Preprocessor, Scanner and Parser
During translation of source code, some common steps are
Preprocessor: Run prior to translation to transform a program into a
form suitable for translation.
Lexical Analyzer (a.k.a. The Scanner)
Lecture 12: Destructors, References and const
Special member function of a class, executed when an
object of its class goes out of scope or when the
delete expression is applied to a pointer to the object
of that class that had been dynamicall
Pre-requisite: ECE 3210
From the Office of the Provost
Getting Ready for the Course
Make sure you understand
concepts covered in:
Lecture 2: Data Types (cont.)
How can you determine the range of
each data type in a program
(maximum, minimum value)?
Lecture 2: Data Types (cont.)
Single Precision Floating Point
How is a number such as 0.15625 stored
ECE 3220 Software Design in C and C+
Lecture 14: In-Class Assignment #4
Inheritance on C+
The goal of this assignment is to extend example L13_Ex1_inheritance.cpp discussed in
Lecture 13. Take that code as a starting point for this assignment.
Lecture 10: Introduction to Object-Oriented
Programming and Classes
Object-Oriented (OO) Programming
In the OO paradigm, objects are a collection of
memory locations paired with the operations that can
change the values of these memory locations.
Lecture 6: Memory Allocation
The environment binds names to locations
In an interpreted language, the symbol table and
environment are combined.
Not all names need to have a location (e.g.
const int MAX = 10; The compiler replaces M
Lecture 11: Classes (cont.)
Member functions and data members are always
accessed with respect to a particular object. Even
within a member function. Consider the following
example from the Stock class:
Stock stock1, stock2;
Lecture 8: Multidimensional and Ragged Arrays
Each row of the array is the same size. Can
be defined as in the following examples:
This allocates 200 int-sized memory locations in the stack.
char mdArray   =
Memory Load: 46%
Available Physical Memory: 4399m/8163m
Available Page File: 4255m/10332m
Available Virtual Memory: 3971m/4095m
Available Extended Virtual Memory: 0m
Peak Working Set Size: 29m
Lab 9: Sinusoidal Steady-State Analysis
November 15, 2016
Understanding the RC, RL, and RLC steady state sinusoidal circuits, and the concepts of
phasors, phase shift, power factor and power calculations.
Phasor transform transfers sinu
Lab 3: Ohms Law and Voltage Division
September 20, 2026
To understand Wheatstone Bridges and Delta-Wye transformations
A Wheatstone bridge is used to measure unknown electrical resistance by balancing two legs of
a bridge in a circuit.
Lab 5: Superposition
October 11, 2026
To understand the superposition theorem using resistance networks by making and measuring
the currents and voltages at the terminals of the network and comparing these results.
Superposition can be
Lab 2: Ohms Law and Voltage Division
September 6, 2016
To calculate the resistance of an unknown resistor using the voltage-current method and to
understand how to use a voltage divider.
The voltage-current method uses Ohms law to calcu
Lab 7: Oscilloscope & Function Generator
October 25, 2016
To learn the basics of using the oscilloscope and the function generator. By the end of the lab,
the user should be able to output a signal, read, and use it to drive a circuit.
The Forsaken Undercrypt of Shiva the Destroyer
Hewn Stone (Climb DC 25)
Uneven Flagstone (Balance DC 10 to charge or run)
Dark (individual cr