Number Systems, Pointers, Arrays, and MIPS Registers

Number Systems

Data types:

  • int: 4 bytes
  • float: 4 bytes
  • double: 8 bytes
  • char: 1 byte

Format Specifiers:

  • %d: int
  • %f: float
  • %p: pointer
  • %c: char

Converting Base-R to Decimal

Example: 1101.102 = 1 * 23 + 1 * 22 + 0 * 21 + 1 * 20 + 1 * 2-1 + 0 * 2-2

Converting Decimal to Base-R

For Whole numbers: Repeated division by R until the quotient is 0. The remainders form the answer, with the first remainder being the least significant bit (LSB).

For Fractions: Repeated multiplication by R until the fractional part is 0. The

Read More

Software Design Concepts: Analysis, Models, and Architecture

1). Concept Analysis

The analysis concept is basically to understand the business rules and software requirements in order to provide an optimal solution to the problem, with clear aims and objectives. It also defines the scope of the project and the functional and non-functional requirements. It consists of several stages:

  • Recognize the problem: which recognizes the basic elements of the problem as perceived by end users.
  • Evaluation and synthesis, which assesses the information content, defines and
Read More

Computer Ethics: Security, Privacy, and Best Practices

Computer Ethics

Moral guidelines that govern the use of computers and information systems. For example, it involves the unauthorized use of computers and networks, software theft, information accuracy, codes of conduct, and information privacy.

Encryption and 3 Encryption Methods

Encryption safeguards against information theft. It is the process of converting plaintext (readable data) into ciphertext (unreadable characters) through an encryption key (the formula) that often uses more than one method.

Read More

Operating System Fundamentals: Processes, Memory, and Security

Operating Systems: Core Concepts and Mechanisms

Process Scheduling

Round-robin scheduling is a preemptive algorithm that distributes CPU time equally among tasks in an operating system. However, it doesn’t take priority into account. Another issue is that a process might not have any work to do, so it must be actively skipped.

Daemons

Daemons open automatically and run in the background without the user’s input or control. They often start when the computer boots.

What is an Operating System?

There isn’

Read More

Kruskal’s Algorithm and Graph Theory Analysis

Step 1: Create an Edge List Based on the Given Distances

From/ToPraguePlzenBrnoPardubiceTaborOlomouc
Prague09520095150245
Plzen950280220140372
Brno200280014618080
Pardubice952201460210140
Tabor1501401802100273
Olomouc245372801402730

Step 2: List of Edges Sorted by Distance

  • Prague – Plzen: 95
  • Prague – Pardubice: 95
  • Brno – Olomouc: 80
  • Brno – Pardubice: 146
  • Tabor – Plzen: 140
  • Tabor – Prague: 150
  • Pardubice – Olomouc: 140
  • Plzen – Tabor: 140
  • Brno – Tabor: 180
  • Pardubice – Tabor: 210
  • Olomouc – Plzen: 372
  • Olomouc – Tabor: 273
  • Olomouc
Read More

Understanding I/O Blocks and FastCONNECT in CPLDs

I/O Block (IOB) Functionality

The I/O Block (IOB) serves as the interface between the internal logic of a CPLD and the device’s user I/O pins. Each IOB comprises several key components:

  • Input buffer
  • Output driver
  • Output enable selection multiplexer
  • User-programmable ground control

The input buffer is compatible with various signal levels, including standard 5V CMOS, 5V TTL, and 3.3V. It utilizes the internal 5V voltage supply (VCCINT) to maintain constant input thresholds, independent of the VCCIO voltage.

Read More