ECE-C490 Security in Computing
Winter term 2005
Homework #1 Solutions
The diagram below shows a floating-point addition/subtraction unit. Study the diagram and
be sure you understand how it works; then:
Explain the diagram. Follow the data flow and explai
ECE-C490 Security in Computing
Winter Term 2005
Quiz #2 Solutions
Consider a hypothetical floating point system in radix 2 (binary) with the following
characteristics:
1 sign bit
8 bits for a biased exponent
20 bits for the mantissa
For this hypothetical
ECE-C490 Security in Computing
Winter Term 2005
Quiz #1 Solutions
Consider floating-point addition as a computer would perform it. Add the following two
numbers by following the steps below.
A: 0.112 x 103
B: - 0.840 x 102
1) Convert these numbers to the
Midterm Solutions
ECE-C490 Security in Computing
Winter 2005
1a) Given the FS circuit, implement concurrent testing of the FS by monitoring the parity
of its outputs and producing an error alarm signal when that parity is distorted during the
computation.
ECE-C490 Security in Computing
Winter term 2005
Homework #2
Due in class on Tuesday, January 25th
Formulate an algorithm for the subtraction and division of floating point numbers. Then
give a flow diagram of a circuit that implements the algorithm (assum
ECE-C490 Security in Computing
Winter Term 2005
Quiz #3 Solutions
Consider the circuit below. Compute a parity prediction function for this circuit and
implement the function in circuit form so that concurrent testing can be used. You may
use even or odd
ECE-C490 Security in Computing
Winter Term 2005
Quiz #4 Solutions
Answer the following questions regarding the properties of LCM and GCD. Note that
LCM is denoted by [x, y] and GCD by (x, y).
1. What is the value of the following expression in terms of m
ECE-C490 Security in Computing
Winter Term 2005
Quiz #9 Solutions
Consider the group J133+, +133. How many different subgroups may exist for this group?
You do not have to list subgroups; just determine how many could potentially exist. Be
sure to explain
ECE-C490 Security in Computing
Winter Term 2005
Quiz #8 Solutions
+
Numbers, J16 = cfw_0, 1, 2, 15 are encoded in the table so that they constitute a group
+
< J16 , > where the group operation is defined as follows:
+
x, y J16 , x y = (x1 +2 y1, x2 +2 y2
ECE-C490 Security in Computing
Winter Term 2005
Quiz #7 Solutions
Consider the set of n n matrices over . Is this a group with respect to
multiplication and addition? Answer by showing whether or not the requirements for
a group hold (inverse, identity, e
ECE-C490 Security in Computing
Winter Term 2005
Quiz #5 Solutions
1. If you are given the following congruence:
42 12 (mod 10)
a) Can you legitimately cancel the factor 3 from the congruence?
Yes: 14 4 (mod 10)
b) Can you legitimately cancel the factor 6
ECE-C490 Security In Computing
Winter Term 2005
Quiz #6 Solutions
Consider a Diophantine equation:
(a,b) = ax by
Where a = 7200, b = 3132.
Find one solution of the equation (that is, find values of x and y for which the equation
holds) by:
Using the Eucl