Number Systems, Pointers, Arrays, and MIPS Registers
Number Systems
Data types:
int
: 4 bytesfloat
: 4 bytesdouble
: 8 byteschar
: 1 byte
Format Specifiers:
%d
: int%f
: float%p
: pointer%c
: char
Converting Base-R to Decimal
Example: 1101.102 = 1 * 23 + 1 * 22 + 0 * 21 + 1 * 20 + 1 * 2-1 + 0 * 2-2
Converting Decimal to Base-R
For Whole numbers: Repeated division by R until the quotient is 0. The remainders form the answer, with the first remainder being the least significant bit (LSB).
For Fractions: Repeated multiplication by R until the fractional part is 0. The
Read MoreSoftware Design Concepts: Analysis, Models, and Architecture
1). Concept Analysis
The analysis concept is basically to understand the business rules and software requirements in order to provide an optimal solution to the problem, with clear aims and objectives. It also defines the scope of the project and the functional and non-functional requirements. It consists of several stages:
- Recognize the problem: which recognizes the basic elements of the problem as perceived by end users.
- Evaluation and synthesis, which assesses the information content, defines and
Computer Ethics: Security, Privacy, and Best Practices
Computer Ethics
Moral guidelines that govern the use of computers and information systems. For example, it involves the unauthorized use of computers and networks, software theft, information accuracy, codes of conduct, and information privacy.
Encryption and 3 Encryption Methods
Encryption safeguards against information theft. It is the process of converting plaintext (readable data) into ciphertext (unreadable characters) through an encryption key (the formula) that often uses more than one method.
Read MoreOperating System Fundamentals: Processes, Memory, and Security
Operating Systems: Core Concepts and Mechanisms
Process Scheduling
Round-robin scheduling is a preemptive algorithm that distributes CPU time equally among tasks in an operating system. However, it doesn’t take priority into account. Another issue is that a process might not have any work to do, so it must be actively skipped.
Daemons
Daemons open automatically and run in the background without the user’s input or control. They often start when the computer boots.
What is an Operating System?
There isn’
Read MoreKruskal’s Algorithm and Graph Theory Analysis
Step 1: Create an Edge List Based on the Given Distances
From/To | Prague | Plzen | Brno | Pardubice | Tabor | Olomouc |
---|---|---|---|---|---|---|
Prague | 0 | 95 | 200 | 95 | 150 | 245 |
Plzen | 95 | 0 | 280 | 220 | 140 | 372 |
Brno | 200 | 280 | 0 | 146 | 180 | 80 |
Pardubice | 95 | 220 | 146 | 0 | 210 | 140 |
Tabor | 150 | 140 | 180 | 210 | 0 | 273 |
Olomouc | 245 | 372 | 80 | 140 | 273 | 0 |
Step 2: List of Edges Sorted by Distance
- Prague – Plzen: 95
- Prague – Pardubice: 95
- Brno – Olomouc: 80
- Brno – Pardubice: 146
- Tabor – Plzen: 140
- Tabor – Prague: 150
- Pardubice – Olomouc: 140
- Plzen – Tabor: 140
- Brno – Tabor: 180
- Pardubice – Tabor: 210
- Olomouc – Plzen: 372
- Olomouc – Tabor: 273
- Olomouc
Understanding I/O Blocks and FastCONNECT in CPLDs
I/O Block (IOB) Functionality
The I/O Block (IOB) serves as the interface between the internal logic of a CPLD and the device’s user I/O pins. Each IOB comprises several key components:
- Input buffer
- Output driver
- Output enable selection multiplexer
- User-programmable ground control
The input buffer is compatible with various signal levels, including standard 5V CMOS, 5V TTL, and 3.3V. It utilizes the internal 5V voltage supply (VCCINT) to maintain constant input thresholds, independent of the VCCIO voltage.
Read More