EE126 Computer Engineering System Design
Prof. Karen Lentz
TA Jy Young Lee
Add comments to the following MIPS code and describe in one sentence what it
computes. Assume that $a0 is used for the input and initially contains n, a pos
Computer Science I COP 3502
1. To learn how to use stacks and queues
2. To practice implementing known algorithms
Problem: WAR: The Card Game(war.c)
This is a children's game played in many parts of the world. No strategy is invol
TUTORIAL 1 LINK LAYER
1. Name 3 error-detection strategies employed by link layer.
A: Parity checks, checksumming and CRC.
2. Suppose the information portion of a packet contains ten bytes consisting of the
8-bit unsigned binary representation of the inte
Homework 3 Solution
1. Chapter 4: What are the three major routing protocols used in Internet? Give
their full name and their acronym. Which protocol is mainly based on link-sate
algorithm? Which protocol is mainly based on distance vector algorithm?
Chapter 5: data-link layer protocols (some
protocols are nearly same for transport layer)
Chapter 6: MAC sublayer (for broadcast
This chapter: network layer
Telephony networks (i.e., circuit-switching) for stream
1Computer Networking (MAT 379)
1. (5 points) What is the binary equivalent of 22.214.171.124?
2. (10 points) Suppose a LAN uses Class C IP addresses.
i. Which of the 32 bits will denote the ne
Arithmetic Logic Unit
By: Ahmad Yazdankhah
Prof: Dr. Sin-Min Lee
Table of Contents
Review: Bus Concept
Review: CPU Building Block
The Simplest Computer Building Blocks
Typical Schematic Symbol of an ALU
Slides by Sean Szumlanski for COP 3503, Computer Science II
October 9, 2013
Find the lowest-cost path fr
CSCE 212- Introduction to Computer Architecture
Spring 2013- Homework 1
Due date: 01/29/2012, In Class
1. (10 points) Consider the following data for two different processors P1 and P2:
a) Which pr
sprintf(<string>, <formatting., <variables>);
to use strings you need to put #include <string.h>
sprintf(name, " individual 0", num);
int grid; 4 rows w 3 columns each
Security professionals have said for years that the only way to make a computer truly secure is for it to not be connected to any other computers, a method called airgapping. Then, any attack would have to happen physically, with the attacker actually ent
DIANE CHAMBERS has the closest birthday to SAM MALONE.
DIANE CHAMBERS has the closest birthday to NORM PETERSON.
DAN FOUTS has the closest birthday to JOE MONTANA.
JAKE LONG has the closest birthday to ADAM JONES.
SAM MALONE MAY 3 1961
DIANE CHAMBERS AUGUST 16 1970
NORM PETERSON DECEMBER 12 1955
DAN MARINO SEPTEMBER 15 1961
JOHN ELWAY JUNE 28 1960
JOE MONTANA JUNE 11 1956
DAN FOUTS JUNE 10 1951
ADAM JONES MAY 27 197
Internetworking with TCP/IP Final Exam (Solution)
CS 6843- Fall 2009
 Question 1: Describe the difference between OSPF and RIP, including what
information is sent where.
Transport protocol used
Class of algorithm used
The following problems deal with translating from C to MIPS. Assume
that the variables f, g, h, i and j are assigned to registers $s0, $s1, $s2,
$s3, and $s4, respectively. Assume that the base address of the int