Nt1110 Unit 3 Assignment 1 Question Paper

Decent Essays
ASSESSMENT ITEM 3 - ASSIGNMENT 1
SUDHEER KUMAR NANDIGAM
11622446

1. -29
Binary Format of 29: 11101
16 bit binary representation of 29 is 00000000 00011101
16 bit signed magnitude representation of -29 is 10000000 00011101
2’s complement form of -29 is NOT (00000000 00011101) +1
NOT (00000000 00011101) is 11111111 11100010
11111111 11100010 +1
11111111 11100011

2’s complement form of -29 is 11111111 11100011

2. 0 01111110 10100000000000000000000

Sign bit: 0 i.e. positive number
Exponent: 01111110 i.e. 8 bit
Significand: 10100000000000000000000 i.e. 23 bit

X= (-1)s*(1+significand)*2(exponent-127)

S=0
Exponent value in decimal= (01111110)2 =126
Significand = 101

X= (-1)0*(1.101) *2(126-127) =1*(1.101)
…show more content…
X’Y + XYZ’ + Y’ + XZ (Y+Y’) = 1

Left Hand Side:
X’Y + XYZ’ + Y’ + XZ (Y+Y’)
X’Y + XYZ’ + Y’ + XZY+XZY’ //Distributive law//
X’Y + XYZ’ + XZY + Y’ +XZY’ //Commutative Law//
X’Y+XY (Z’+Z) +Y’+XZY’ //Distributive law//
X’Y+XY (1) +Y’+XZY’ //Inverse Law//
X’Y+XY+Y’ (1) +XZY’ //Identity Law//
X’Y+XY+Y’ (Z+Z’) +XZY’ //Inverse Law//
X’Y+XY+Y’Z+Y’Z’+XZY’ //Distributive law//
X’Y+XY+Y’Z+XZY’+Y’Z’ //Commutative Law//
Y (X’+X) +Y’Z (1+X) +Y’Z’ //Distributive law//
Y (1) +Y’Z (1+X) +Y’Z’ //Inverse Law//
Y+Y’Z (1) +Y’Z’ //Null Law//
Y+Y’Z+Y’Z’
Y+Y’ (Z+Z’) //Distributive law//
Y+Y’ (1) //Inverse Law//
(Y+Y’) //Inverse Law//
1
Output for Left Hand Side is 1 which is equals to Right Hand side value
Therefore Left hand side is equal to Right hand side
i.e. X’Y + XYZ’ + Y’ + XZ (Y+Y’) = 1 4. Assumptions

X as Core subject1
Y as Core subject 2
Z as Elective subject
1 as High Distinction (HD)
0 as Not High Distinction

Below is the truth table for above mentioned
…show more content…
* Based on point 3
* Based on point 3
* Based on point 2

Expression based on above truth table is XY’Z+ XYZ+X’YZ +XYZ’

XY’Z+ XYZ+X’YZ +XYZ’
XY’Z+YZ (X+X’) +XYZ’ //Distributive Law//
XY’Z+YZ (1) +XYZ’ //Inverse Law//
XY’Z+YZ+XYZ’
Z (XY’+Y) +XYZ’ //Distributive Law//
Z(Y+Y’X) +XYZ’ //Commutative Law//
Z ((Y+Y’)(Y+X))+XYZ’ //Distributive over AND//
Z ((1)(Y+X))+XYZ’ //Inverse Law//
Z(Y+X) +XYZ’ //Identity Law //
ZY+ZX+XYZ’ //Distributive Law//
ZY+X (Z+YZ’) //Distributive Law//
ZY+X (Z+Z’Y) //Commutative Law//
ZY+X ((Z+Z’)(Z+Y)) //Distributive over AND//
ZY+X ((1)(Z+Y)) //Inverse Law//
ZY+X(Z+Y) //Identity Law//
ZY+XZ+XY //Distributive Law//
XY+YZ+XZ //Commutative Law//

OR
XY’Z+ XYZ+X’YZ +XYZ’
XY’Z+ XYZ+XYZ+X’YZ +XYZ’ //Idempotent Law//
XY’Z+ XYZ+XYZ+XYZ+X’YZ +XYZ’ //Idempotent Law//
XY’Z+XYZ+XYZ+X’YZ+XYZ+XYZ’ //Commutative Law//
XZ (Y’+Y) +YZ (X+X’) +XY (Z+Z’) //Commutative Law//
XZ (1) +YZ (1) +XY (1) //Inverse Law//
XZ+YZ+XY //Identity

Related Documents

  • Decent Essays

    ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    1. I agree that increasing the router memory to infinite cannot control congestion because even if routers have an infinite amount of memory, congestion gets worse, because by the time packets reach to the front of the queue, they have already timed out (repeatedly), and duplicates have been sent. 2. Flow Control vs Congestion Control It ensures that the sender only sends what the receiver can handle.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hammurabi's Code DBQ

    • 442 Words
    • 2 Pages

    The first example is on document E it say “ If a man has knocked out the eye of a free man, his eye shall be knocked out. This is just because if a man knocked out a man’s eye the man will be able to knock out his eye.this matters because if the man with the knocked out eye he will get to knock out the eye of the man who knocked out his eye. In document E it say a”If a man knocked out the eye of a slave he shall pay half his value. This is just because if a man knocked out a eye of a slave then the slave will get more money than he is seposto.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    E. Also suppose a malicious node M can hear A, B, C and D. The attack can be described as follows:[18] “To start the attack, M changes its MAC address to match A’s, moves closer to and out of the range of A. It then sends an RREP to B that contains a hop count to X that is less than the one sent by C, e.g., zero. Therefore B changes its route to the destination, X, to go through A, as illustrated in Figure. 1.4.…

    • 210 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Step1: Start the program Step2: Initialize the nodes by fixing the number of nodes, type of antenna used, type of routing protocol and plotting circumference Step3: Frequency is allocated for the MIMO antennas. Step4: Positioning and plotting the nodes Step5: Base Bandwidth allocation for primary and secondary nodes • Primary network range-…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Pangu 9 jailbreak is now out for those of you running the latest iOS 9.0.2 software update. You can follow the guide for jailbreaking with Pangu 9 on every device that can run the iOS 9.0.2 firmware. You can catch that completely list available from the requirements section below. Those with anything under the iPhone 4S cannot follow this guide, just like they cannot update to any version of iOS 9. REQUIREMENTS…

    • 516 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Installing a custom recovery replaces the stock recovery on your Samsung smartphone. If you are not an advanced Android user, it doesn't matter which recovery you have on your device. However, people who want to install custom ROMs must replace the stock recovery for a custom recovery. Installing a new custom recovery on a Samsung device is usually easy thanks to the Odin flashing tool. You can just install the file as you would any other official software update for upgrading or downgrading the operating system.…

    • 432 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Final Exam Paper

    • 233 Words
    • 1 Pages

    21 Which operating system doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 22Which Operating System doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 23…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The article provides a list in which all statements are conditions in which whites hold…

    • 773 Words
    • 4 Pages
    Improved Essays