Assignment 4
Assignment 4
Assignment 4
Instructions:
This assignment will assess how well you have understood these topics. Make sure you have
read through the course materials for these topics before attempting this assignment.
o 13.1 - User-Defined Data Types
o 13.2 - File Organisation and Access
o 13.3 - Floating-Point Numbers, Representation and Manipulation
o 14.1 - Network Protocols
o 14.2 - Circuit Switching and Packet Switching
o 15.1 - Processes, Parallel Processing and Virtual Machines
o 15.2 - Boolean Algebra and Logic Circuits
You must ensure that the work you submit for this assignment is your own. Your tutor may
use plagiarism checkers if they are concerned that your work has been copied from another
source.
Upon completion of this assignment, you will need to submit your work to your tutor by
following the instructions in the study guide. When marked, you will receive both your final
score and feedback from your tutor.
If you have any questions or need help, please contact your personal tutor for Computer
Science.
ANSWER ALL QUESTIONS
Q1 [3]
To score full marks on this question you must show your working out.
01110 001
Q2 [4]
To score full marks on this question you must show your working out.
11000 110
Q3 [4]
4. Show the denary number -48.5 in floating-point binary form, representing the
mantissa and exponent in two’s complement using as few bits as possible.
To score full marks on this question you must show your working out.
Q4 [4]
5. Here are some floating-point numbers showing the mantissa and exponent.
Tick (✔) one box on each row to indicate if each number is normalised or not
normalised.
001101 0110
101100 1100
111110 1001
011010 0101
Q5 [4]
To score full marks on this question you must show your working out.
00001011 0111
Q6 [4]
7. State the reason why floating-point numbers are normalised.
Q7 [1]
10. Protocols such as the TCP/IP stack are broken down into layers.
Complete the table by inserting the names of the three missing layers.
Application Layer
Q10 [3]
11. State two reasons why protocols are broken down into layers.
Q11 [2]
12. BitTorrent is a protocol used at the application layer for the exchange of data.
13. Describe two differences between packet switching and circuit switching.
Q13 [4]
14. State two benefits of using circuit switching instead of packet switching.
Q14 [2]
15. Tommy is designing a new smartwatch that will be mass produced. He is considering
using either a CISC processor or a RISC processor.
Describe two reasons why Tommy should use a RISC processor in his new
smartwatch rather than a CISC processor.
Q15 [4]
16. For each statement below, state if it refers to a CISC processor or a RISC processor.
The length of the programming code is longer.
Has a smaller set of instructions of fixed length.
Focuses on hardware. The processor has to be more complex.
Takes multiple clock cycles to execute an instruction.
Has more CPU registers.
Makes inefficient use of memory.
Cannot make use of pipelining.
Costs more to design and manufacture.
Q16 [5]
AB
00 01 11 10
00
01
CD
11
10
Simplified Expression =
Q18 [5]
19. Use a Karnaugh map to simplify the following expression.
AB
00 01 11 10
00
01
CD
11
10
Simplified Expression =
Q19 [5]
END OF ASSIGNMENT
Please submit your work to your tutor by following the instructions in the study guide. When
marked, you will receive both your final score and feedback from your tutor.