0% found this document useful (0 votes)
5 views

Assignment 4

Uploaded by

hassanahmed1206
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Assignment 4

Uploaded by

hassanahmed1206
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer Science

Assignment 4
Instructions:
 This assignment will assess how well you have understood these topics. Make sure you have
read through the course materials for these topics before attempting this assignment.
o 13.1 - User-Defined Data Types
o 13.2 - File Organisation and Access
o 13.3 - Floating-Point Numbers, Representation and Manipulation
o 14.1 - Network Protocols
o 14.2 - Circuit Switching and Packet Switching
o 15.1 - Processes, Parallel Processing and Virtual Machines
o 15.2 - Boolean Algebra and Logic Circuits

 You should answer all questions.

 Write your answers in a separate document such as a Microsoft Word file.

 If required, make sure you show all of your working out.

 You must not use a calculator.

 The total mark for this assignment is 70.

 You must ensure that the work you submit for this assignment is your own. Your tutor may
use plagiarism checkers if they are concerned that your work has been copied from another
source.

 Upon completion of this assignment, you will need to submit your work to your tutor by
following the instructions in the study guide. When marked, you will receive both your final
score and feedback from your tutor.

 If you have any questions or need help, please contact your personal tutor for Computer
Science.
ANSWER ALL QUESTIONS

1. A program needs to store data in an external file.

State three ways the data could be organised in the file.

Q1 [3]

2. This number is represented in floating-point format, with a 5-bit mantissa in two’s


complement followed by a 3-bit exponent in two’s complement.

Calculate the denary value of the number.

To score full marks on this question you must show your working out.

01110 001
Q2 [4]

3. This number is represented in floating-point format, with a 5-bit mantissa in two’s


complement followed by a 3-bit exponent in two’s complement.

Calculate the denary value of the number.

To score full marks on this question you must show your working out.

11000 110

Q3 [4]
4. Show the denary number -48.5 in floating-point binary form, representing the
mantissa and exponent in two’s complement using as few bits as possible.

To score full marks on this question you must show your working out.

Q4 [4]

5. Here are some floating-point numbers showing the mantissa and exponent.

Tick (✔) one box on each row to indicate if each number is normalised or not
normalised.

Normalised NOT Normalised

001101 0110

101100 1100

111110 1001

011010 0101

Q5 [4]

6. This number is represented in floating-point format, with an 8-bit mantissa in two’s


complement followed by a 4-bit exponent in two’s complement.

Normalise the number shown.

To score full marks on this question you must show your working out.

00001011 0111
Q6 [4]
7. State the reason why floating-point numbers are normalised.
Q7 [1]

8. Describe what is meant by the term protocol.


Q8 [2]

9. State what these protocols are used for.


 TCP/IP
 HTTP
 FTP
 SMTP
 POP
 IMAP
Q9 [6]

10. Protocols such as the TCP/IP stack are broken down into layers.

Complete the table by inserting the names of the three missing layers.

Application Layer

Q10 [3]

11. State two reasons why protocols are broken down into layers.
Q11 [2]
12. BitTorrent is a protocol used at the application layer for the exchange of data.

Explain how applications use BitTorrent to exchange data.


Q12 [4]

13. Describe two differences between packet switching and circuit switching.
Q13 [4]

14. State two benefits of using circuit switching instead of packet switching.
Q14 [2]

15. Tommy is designing a new smartwatch that will be mass produced. He is considering
using either a CISC processor or a RISC processor.

Describe two reasons why Tommy should use a RISC processor in his new
smartwatch rather than a CISC processor.
Q15 [4]
16. For each statement below, state if it refers to a CISC processor or a RISC processor.
The length of the programming code is longer.
Has a smaller set of instructions of fixed length.
Focuses on hardware. The processor has to be more complex.
Takes multiple clock cycles to execute an instruction.
Has more CPU registers.
Makes inefficient use of memory.
Cannot make use of pipelining.
Costs more to design and manufacture.

Q16 [5]

17. Draw the logic circuit for a half adder circuit.


Make sure you add suitable labels for your inputs and outputs.
Q17 [4]

18. Use a Karnaugh map to simplify this expression.

(A.B) + (A.B) + (C.D)


To score full marks on this question, you should clearly identify the groups that you
have used to simplify the expression.

AB
00 01 11 10
00

01
CD
11

10

Simplified Expression =
Q18 [5]
19. Use a Karnaugh map to simplify the following expression.

(A.B.C.D) + (A.B.C) + (D)


To score full marks on this question, you should clearly identify the groups that you
have used to simplify the expression.

AB
00 01 11 10
00

01
CD
11

10

Simplified Expression =

Q19 [5]

The total mark for this assignment is 70

END OF ASSIGNMENT
Please submit your work to your tutor by following the instructions in the study guide. When
marked, you will receive both your final score and feedback from your tutor.

You might also like