0% found this document useful (0 votes)
21 views

COA Tute 0

COA Tute 0

Uploaded by

Sasuke Uchiha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

COA Tute 0

COA Tute 0

Uploaded by

Sasuke Uchiha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Tutorial Sheet ODD SEM 2020

Computer Organization and Architecture (15B11CI313)

5th Sem CSE


Jaypee Institute of Information Technology, Noida

Instruction for Tutorials

1. Tutorial has to be submitted (Turnin) within three days of tutorial


class conducted.
2. Graded tutorial sheet will be returned within week of conduct of
tutorial class by the concerned teacher.
3. All tutorial submission has to be handwritten with your name,
enrollment and batch compulsory on it.
4. End of the semester COA project will be evaluated in tutorial class
5. Attendances are compulsory for all tutorial classes
Zero-Tutorial

Assembly language is machine specific and considered a "low level" language which is close
to machine language. This means that the code and syntax of assembly is much closer to the
computer's processor, memory, and I/O system. A high-level language is designed with
keywords, libraries, and a syntax that introduces a high level of abstraction between the
language and the hardware.

Machine code or assembly code is still needed for important tasks, e.g.

1. Hardware specific code, such as device drivers


2. Embedded devices, where size of the code is important (smaller code the better the
performance)
3. Low level code where performance is critical etc.

Often, assembly language can be mixed into higher level languages, such as C, where
assembly can be added inline to the C code.

All assembly programs use hexadecimal representation for their data manipulation and
memory address. Therefore, it is important to understand hexadecimal representation to
understand the address and data manipulation done in this architecture course.

Tutorial problems for developing the feel of Hex values


While dealing with memory addresses, it is essential that you are fully conversant with the
use of Hexadecimal numbers for expressing addresses. Besides addresses, memory contents
and machine codes are also usually expressed in hexadecimal (hex) only and not binary.
Attempt the following simple problems without taking help of anybody. That will sharpen
your understanding of hex system.
1. What is the relationship between size of a memory and number of address lines
required for it? How many address lines are required for following sizes of memory
(a) 2KB, (b) 8KB, (c) 64KB, (d) 1MB, (e) 1GB (f) 16GB
2. How many binary bits make a hex digit? Give an example.
3. Convert the following decimal numbers to Hex – 924, 22, 65536, 256
4. Convert the following Hex numbers to decimal values – 1000H, 55AH, 6BH, AAH
5. Find next hex number to each of the given hex numbers – 209H, FFH, 7FFH
6. Add the following pairs of hexadecimal numbers (i) 2FFH and 123H, (ii) 549FH and
FFFFH
7. A 2KB memory has a starting address of 2000h. Calculate the final address. Repeat
for 4K and 16K memories
8. A 1 MB memory is divided into 16 non-overlapping segments of 64KB each Find the
range of addresses for each segment.

JIIT, Noida 5th Sem, CSE Pg. No. 2


9. A 4 GB memory is divided into 64 non-overlapping segments of 64MB each Find the
range of addresses for first 8 and last 8 segments.
10. In a 1 MB memory divided into 64 KB segments, if a segment starts at the address
1234A find the last address in the segment
11. Which of the following hex numbers is divisible by 16 ? 16h, 10h, 20h, 32h, 2000h,
10

3300h, 45678AB0h

JIIT, Noida 5th Sem, CSE Pg. No. 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy