=
Assignment #2
Due Date: 09/23/2010 THURSDAY
=
(Q1) Do the following exercises in the text book:
Q3-2, Q3-4, Q3-5, Q3-6
(Q2)
(i)What is the value (hexadecimal) left in the destination register l1 after each operation (i)-(v)?
Show your workings.
(i)
mov
Massachusetts Institute of Technology
Department of Electrical Engineering and Computer Science
6.087: Practical Programming in C
IAP 2010
Problem Set 3 Solutions
Control ow. Functions. Variable scope. Static and global variables. I/O: printf and scanf. F
Review: Constructors
Method that is called when an instance is created
class Integer cfw_
public:
int val;
Integer() cfw_
val = 0; cout < "default constructor" < endl;
;
int main() cfw_
Integer i;
Output:
default constructor
When making an array of ob
Sinusoidal Inputs and LTI Systems
h[n]
A very important property of LTI systems or channels:
If the input x[n] is a sinusoid of a given amplitude,
frequency and phase, the response will be a sinusoid at the
same frequency, although the amplitude and phase
Demo: Deconvolving Output of
Channel with Echo
x[n]
Channel,
h1[.]
y[n]
Receiver
filter, h2[.]
z[n]
Suppose channel is LTI with
h 1[n]=[n]+0.8[n-1]
h1[m]e jm
H1() = ? =
m
So:
= 1+ 0.8ej = 1 + 0.8cos() j0.8sin()
|H1()| = [1.64 + 1.6cos()]1/2
EVEN function
Single Link Communication Model
Original source
Digitize
iti
(if needed)
End-host
computers
Receiving app/user
ga
Render/display,
etc.
etc
Source binary digits
Source binary digits
(message bits)
Source coding
Bit stream
Bit stream
t
m
Source decoding
de
Lecture notes for 15.564: Information Technology I
Outline: Computer Networks
Sending data between two computers
Sending data among many computers
Network Protocols
software for networks
Real-life networks
LANs
WANs
Internetworking
The Internet
1
Todays L
What is computer security?
Securing communications
Three steps:
Secrecy = prevent understanding of intercepted communication
Authentication = establish identity of sender
Integrity = establish that communication has not been tampered
with
Securing a
CSC 3210
Computer Organization and
Programming
Chapter 1: Introduction
Dr. Awad A Younis Mussa
Outline
- Fundamental definition of a computer
Basic computer cycle
- Classic implementations of the computer
Stack machine architecture
Hand-programmable ca
CSC 3210
Computer Organization and
Programming
Chapter 1: Introduction
Dr. Awad A Younis Mussa
Outline
- Fundamental definition of a computer
Basic computer cycle
- Classic implementations of the computer
Stack machine architecture
Hand-programmable ca
=
Assignment #5
Due Date: 11/18/2010 THURSDAY
=
Q1. Write an assembly program that prompts the user for two numbers and prints the sum
Sample Screen Shot:
Enter Number 1:
2
Enter Number 2:
3
The sum of 2 and 3 is 5
Note:
Your program should contain .data
=
Assignment #5
Due Date: 11/04/2010 THURSDAY
=
Q1. Translate the following three subroutines into assembly language.
main()
cfw_
fn(1,3,2,4,8,6,5);
fn(int a, b, c, d, e, f, g)
cfw_
register int x, y, z;
x = a + b*c
y = d - e / f;
z = power(x, g);
z = z
Write a SPARC program that uses closed subroutines to take in input
for the size of an integer array up to 10, initializes an array to user
input variables, sorts the array, prints the minimum, median and
maximum elements of the array and takes the averag
CSC 3210 Assignment #4
SPRING 2012
Due Tuesday, November 19th 11:59 pm
Write a program that accepts a string from the user. You can assume the length of the string will be less
than 30 characters and only alphabetical letters are entered.
Your program sho
IN CLASS QUIZ 4
45 minutes to complete
Instructions:
Can do it on paper or on solar and submit to quiz4 folder by taring file names together and using:
tar -cvzf file.tar.gz inputfile1 inputfile2 inputfile2
./cs32150/handin quiz4 filename
1)
Translate the
CSC 3210 Assignment #1
FALL 2013
due Thursday, September 12th, 2:30 pm
Objective:
To become familiar with the Unix system and assembly code.
Requirements:
1. Type the given Hello, World! program, written in C, to a file called hello.c
2. Use the gcc compi
Practice Set 1 Instructions
Write each in order equation as a post order equation. Also show how each equation would look in the stack for the
value 7 = x. Write the Machine Code and Assembly Code as well as macros used for each equation.
NOTE:
You should
Assignment #2
Due Tuesday, October 15th, 2013 by 2:30pm
Program Description:
Write an assembly language program (using macros) to find the maximum and minimum of the
following equation:
for the range -3 x 3 and -2 z 2, by stepping one by one through the r
Assignment #3
Due Tuesday, October 22th, 2013 By 2:30pm
Write a program to find and print a Fibonacci sequence of numbers. The Fibonacci sequence is
defined as follows:
Your program should prompt the user to enter a limit, print the sequence up to the lim
CSC 3210
Computer Organization and
Programming
Chapter 1: Introduction
Dr. Awad A Younis Mussa
Outline
- Fundamental definition of a computer
Basic computer cycle
- Classic implementations of the computer
Stack machine architecture
Hand-programmable ca
Fast Fourier Transform (FFT) to compute
samples of the DTFT for
signals of finite duration
For an x[n] that is zero outside of the interval [0,L-1], choose
P L (with P preferably a power of 2; well assume that its at
least a multiple of 2, i.e., even):
P1
Lecture notes for 15.564: Information Technology I
Outline: Connecting Many Computers
Last lecture:
sending data between two computers
This lecture:
link-level network protocols (from last lecture)
sending data among many computers
1
Review: A simple poin
1.124J Foundations of Software Engineering
Problem Set 2 - Solution
Due Date: Tuesday 9/26/00
Problem 1:[10%]
1. Which of the following functions, whose declarations are given below, will be called:
float myF;
printMyF(2.0*myF);
b. void printMyF(double)
2
Regulus Template
Lorem ipsum dolor sit amet, consectetur adipisicing elit,
sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
The Power of Powerpoint - Jun Akizaki
01
About Us
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed d
Regulus Template
Lorem ipsum dolor sit amet, consectetur adipisicing elit,
sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
The Power of Powerpoint - Jun Akizaki
01
About Us
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed d
Regulus Template
Lorem ipsum dolor sit amet, consectetur adipisicing elit,
sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
The Power of Powerpoint - Jun Akizaki
01
About Us
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed d
CSC 3210
Computer Organization and
Programming
Chapter 2
SPARC Architecture
Dr. Anu Bourgeois
1
Introduction
SPARC is a load/store architecture
Registers used for all arithmetic and
logical operations
32 registers available at a time
Uses only load an
Chapter 4 Binary Arithmetic
These are lecture notes to accompany the book
SPARC Architecture, Assembly Language
Programming, and C,
by Richard P. Paul, 2nd edition, 2000.
By Michael Weeks
Richard P. Paul, SPARC Architecture, Assembly Language
Arithmetic
Chapter 3 Digital Logic and
Binary Numbers
These are lecture notes to accompany the book
SPARC Architecture, Assembly Language
Programming, and C,
by Richard P. Paul, 2nd edition, 2000.
By Michael Weeks
Richard P. Paul, SPARC Architecture, Assembly Langua
CSC 3210
Computer Organization and
Programming
Introduction and Overview
Dr. Anu Bourgeois
Administrative Issues
Required Prerequisites
CSc 2010 Intro to CSc
CSc 2310 Java Programming
CSc 2510 Discrete Math
3 absences allowed
otherwise could be drop
Chapter 7 Subroutines
These are lecture notes to accompany the book
SPARC Architecture, Assembly Language
Programming, and C,
by Richard P. Paul, 2nd edition, 2000.
By Anu G. Bourgeois
Richard P. Paul, SPARC Architecture, Assembly Language Programming, an