Nt1310 Unit 1 Case Study

Improved Essays
1. The advantage of using a very large memory cell size is that the computer can store larger values in its memory cells. The disadvantage is that there would be fewer cells available.
2. This question asks how many bits are needed in the MAR with the following numbers
a. 1 million bytes = 20 bits
b. 10 million bytes = 24 bits
c. 100 million bytes = 27 bits
d. 1 billion bytes = 30 bits
3. 640 kb would be 655,360 memory cells. A 512MB would contain 536,870,912 memory cells. A 2GB would contain 2,097,152,000 memory cells
4. ROM is read only information. This information is put into ROM in the factory and normally not messed with. It contains information such as BIOS, and firmware information.
5. 1 MB of storage would be 1024 × 1024.
6. The
…show more content…
The memory would have to be 2-dimensional.
8. There would have to be some sort of directions or conversion in order to translate the MDR to match what goes in the instruction. Without that there would be a fatal error because in the MDR would not be able to be read by something that is only looking for 32 bit instructions.
9. ((65*60)/780) *500 = 2500M floating points
10.
11. The main advantage of this way is that there is not as much emphasis is put on the memory, as the information is put into the hardware. The disadvantage is that the code would have to be changed based on the hardware and must be tested over and over again.
12. This asks some questions about disk storage
a. 1024 (characters per sector)*20 (sectors per track) *500 (tracks per surface)*2 (number of 2 surfaces) = 20,480,000 characters
b. Best = .42 Average = 12.59 Worst =
…show more content…
Best case = .31 Average 11.44 worst 32.01
14. The best and fastest area to store the file would be on the first available sector as the access time would be .42 so that would mean being at one would be the fastest time. On average it takes close to 13 so that would also be a good spot to start. However, to be saving to the 60 track would be the safest as it is sure to be read in a timely fashion.
15. I believe the best would still be .42 and then the worst would be 10.25 and then the average would be 9.55. It would be a lot faster since it does not have to worry about 500 tracks per surface rather then just the 20 sectors per track
16. In order to read every sector on the whole disk it would be .42 (best case reading a sector) * 20 (number of sectors) *500 (number of tracks) *2 (number of side) = 8400
17. Someone would use sequential access storage devices when it is one file or one group of something that will be read in order from beginning to end. This could be used for backups as it can be moved somewhere, and then when restored will be read in order from start to finish.
18. 8929 instructions (rounded up)
19. This question asks about instruction register
a. 64
b. 256 kilobytes = 262,144

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    The code can appear in several forms, however in this lab the modular approach was used. This form allows the program to be created in sections, and then the sections are compiled together to formulate the code in its entirety. In each part of this lab a code was created using this approach, such as code one which can be seen in Figure 5. After a code, has been completed it is compiled to ensure no errors are present, which would interfere with the output generated on the DE2-115 board.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    The following data is received from a real-time measuring device and is stored at memory location Data1. You are required to write an assembly language program segment with the corresponding data definition directives that would extract the data items and store them at memory locations Day, Month, Year, Temperature and Pressure. [10 points] 5 bits 4 bits 7 bits 8 bits 8 bits Day Month Year Temperature Pressure Write an assembly language program for the following HLL code: [10 Points] unsigned int crc32(const char* data, size_t length) { const unsigned int POLY = 0xEDB88320; unsigned int reminder = 0xFFFFFFFF; for(size_t i = 0; i < length; i++){ reminder ^= (unsigned char)data[i]; // must be zero extended for(size_t bit = 0; bit…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 7

    • 507 Words
    • 3 Pages

    5. The width of the data bus should equal or exceed CPU word size. The bus clock rate should match the CPU clock rate, though this is difficult or impossible to achieve. 6. 7. The most important factor is miniaturization—decreased size of devices and the wires connecting them.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Xacc/280 Week 6 Checkpoint

    • 1119 Words
    • 5 Pages

    In this course we will consider significant figures to be: 1) any non-zero digit, 2) zeros within a number…

    • 1119 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Part 1 Different data types and their uses - The different data types that is available for creating or developing a program on software. An example of programming software would be Microsoft Visual Studio. With this software, many data types are used which can drive an event. -…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The range of the speed of CD DVD ROM are between 1x to 72x. This means is the CD DVD ROM was 72x it read it that much faster("What Is CD-ROM?"). DVD ROM is only a digital dic, the most common use for DVD ROM is for store large software applications. A DVD-ROM stores around 4.38 GB of data. A…

    • 1029 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    This consist primary storage and secondary storage, e.g. Hard disk, Universal Serial Bus (USB) and Floppy Disk etc. · Graphics: According to Wikipedia (2017)…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 676 Words
    • 3 Pages

    There are several possible types of terrorist attacks using Weapons of Mass Destruction (WMD), using conventional firearms and explosives, or ”other means of attack (including low-tech devices and delivery, attacks on infrastructure, and cyber terrorism)”, (FEMA, 2002, P. 9). Each type of attack or a combination of several will need its own action plan by emergency managers and emergency responders, making the identification of the type of attack and weapon used critical. If an attack occurs, one tool available to a jurisdiction is the Threat and Hazard Identification Risk Assessment (THIRA), which summarizes the “threats and hazards of concern showing how they may affect the community” (DHS, 2013, P.1). The THIRA will outline the possible risks that would be facing emergency responders after a specific disaster and what they might face (FEMA, 2002). For example, the guide describes the threat of radiation after a nuclear/radiological attack, or the threat of contamination after a chemical or biological attack.…

    • 676 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    If you are able to better understand how memory works in…

    • 210 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cache memory is organized into blocks. Each block provides a small amount of storage, perhaps between 8 and 64 bytes, also known as a cache line. The block will be used to hold an exact reproduction of a corresponding amount of storage from somewhere in main memory (Englander, I. 2014). Another important factor is a processor's L2 cache, which stores memory data and speeds up operation by making recently accessed data immediately available to the processor.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Standard 3 4 ppm .3232 Standard 4 5 ppm .4124 Standard 5 8 ppm .6053…

    • 1251 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The maximum number of rows is 5000, the minimum number of rows 0 C. The maximum number of rows is 50, the minimum number of rows 0 D. The maximum number of rows is 100, the minimum number of rows 100 E. It is not possible to estimate a maximum and minimum. More information is…

    • 794 Words
    • 4 Pages
    Improved Essays