EEE 120 Simulation Lab 4 – The Microprocessor

Task 4-1: Build the Brainless Central Processing Unit

Include a picture of your Logisim Brainless Central Processing Unit circuit here:

Figure 1. Brainless Central Processing Unit JCC

 

Task 4-2: Test and Control the Brainless Central Processing Unit

Perform the testing procedures outlined in the laboratory manual and fill in the blanks below. (Note that these questions appear in the text of the laboratory manual.)

· Record the first number placed on the data bus here: 5

· What do the following three switches need to be set to in order to perform the pass-through operation? /~A_Only = 0 /~Invert= 1 Logic/~Arith= 0

· Enter the second number you entered into the data bus here: 2

· What do the following three switches need to be set to in order to perform the ADD operation? /~A_Only = 1 /~Invert= 1 Logic/~Arith= 0

· Write down the number that appears in the accumulator here: 7

Describe other numerical additions and other operations you checked in order to verify your brainless CPU here: I repeated the additions several times using 3, 4 and 1 and toggled through several times till I got the correct addition.

After you are convinced your circuit is working properly, remove the 4-bit binary keyboard and set the ACC to Data Bus pin to 1. Did the output of the accumulator appear on the data bus? Yes.

How does the output of the ALU change? It changed to Hex E.

If the 4-bit binary keyboard was not removed and the ACC to Data Bus switch is set to 1, what would you expect to see displayed in the hex digit display attached to the data bus?

I expect to see whatever is supplied to the data bus in hex display.

Add the 4-bit binary keyboard back into your circuit and observe the hex digit display on the data bus for various keyboard values. Is the value on the hex digit display what you expected? Yes.

Explain Only 1 signal is being allowed to enter the buffer at a time. Therefore, the buffer is receiving only the output of the register.

Why do you think the register at the output of the ALU is called the ‘accumulator’? Because it stores data that passes through the ALU, it provides a feedback path tho the B input of the ALU and because it can store intermediate arithmetic or logic results.

 

Task 4-3: Build the Addressing Logic

Include a picture of your Logisim addressing logic circuit here:

Figure 2. Addressing Logic JCC

Test your circuit and record the results in Table 1. Include a picture of your Logisim addressing logic circuit testing set up.

Figure 3. Testing Addressing Logic JCC

Table 1
A

(4-bit binary)

Y0 Y1 Y2 Y3 Y4 Y5 Y6 Y7
0000 1 0 0 0 0 0 0 0
0001 0 0 1 0 0 0 0 0
0010 0 1 0 0 0 0 0 0
0011 0 0 0 1 0 0 0 0

 

Task 4-4: Build a 4-Bit ROM Memory Cell

Include a picture of your Logisim 4-bit ROM circuit here:

Figure 4. 4-bit ROM memory cell JCC

Test your circuit and record the results in Table 2. Include a picture of your Logisim 4-bit ROM circuit testing set up.

Figure 5. Testing 4-bit ROM memory cell JCC

Table 2
A

(4-bit binary)

Read Memory Select Y

(Data Bus)

0001 1 1 1
0101 1 1 5
1000 1 1 8
1000 0 1 X
1000 1 0 X
1000 0 0 X

 

Task 4-5: Build 4-Bit Output Port

Include a picture of your Logisim 4-bit output port circuit here:

Figure 6. 4-bit output device JCC

Test your circuit and record the results in Table 3.

Table3
Data Bus (4-bit binary) Write Memory Select Q
0001 1 1 1
0010 0 1 Last Q
0011 1 0 Last Q
0011 0 0 Last Q
0011 0 0 0
0011 1 0 0
0011 1 1 3
0001 0 0 0

 

Task 4-6: Build the 4-Bit RAM Cell

Include a picture of your Logisim 4-bit RAM circuit here:

Figure 7. 4-bit RAM JCC

Test your circuit and record the results in Table 4. Include a picture of your Logisim 4-bit RAM circuit testing set up.

Figure 8. Testing 4-bit RAM JCC

Table4
Data Bus

(4-bit binary)

Write Memory Select Read Q {between register and buffer} Data Bus {after buffer}
0110 1 1 1 6 6
0110 0 1 1 6 6
0110 1 0 1 6
0110 0 0 1 6
0110 0 0 0 6
0101 1 1 1 5 5

 

Task 4-7: Build the Brainless Microprocessor

Include a picture of your Logisim brainless microprocessor circuit here:

 

 

Task 4-8: Testing and Controlling the Brainless Microprocessor

Follow steps 1 through 3 outlined in the laboratory manual to test your brainless microprocessor circuit. List in Table 5 the control lines you needed to control to store the accumulator (ACC) to

 

RAM. (If the control line value has no impact, place a dash ‘-‘ in the value column).

Table5
Control line Value
4-bit binary keyboard

(Address Bus)

Write 0
Read 1
ACC to Data Bus 0
Load ACC 1
/~A_Only 0
/~Invert 0
Logic/~Arith 1

Describe any other tests that you performed. NOTE: the laboratory manual gives you a minimum set of items to test: __________________________________________________________________________

_____________________________________________________________________________________

___________________________________________________________________________________

____________________________________________________________________________________

____________________________________________________________________________________

 

 

Table 6 is an example, for the ADD command, of how to fill out tables to record the values of the control lines during every clock cycle.

Table6
Instruction [ Add operand to Accumulator (ACC) ]
Control Line Value
4-bit Binary Keyboard (Address Bus) Address of operand
Write 0
Read 1
ACC to Data Bus 0
Load ACC 1
/~A_Only 1
/~Invert 1
Logic/~Arith 0

For all of the instructions you performed (i.e. Subtract, Load ACC, etc.) record the values of the control lines during every clock cycle in Table 7Table 8and Table 9.

 

Table7
Instruction [Subtract operand from ACC ]
Control Line Value
4-bit Binary Keyboard (Address Bus) 3
Write 1
Read 1
ACC to Data Bus 0
Load ACC 1
/~A_Only 1
/~Invert 1
Logic/~Arith 0

 

Table8
Instruction [Load ACC with operand]
Control Line Value
4-bit Binary Keyboard (Address Bus) 3
Write 1
Read 1
ACC to Data Bus 1
Load ACC 1
/~A_Only 0
/~Invert 1
Logic/~Arith 1
Instruction[AND operand with ACC]
Control Line Value
4-bit Binary Keyboard (Address Bus) x
Write 0
Read 1
ACC to Data Bus 0
Load ACC 0
/~A_Only 1
/~Invert 0
Logic/~Arith 1
Instruction[ Store ACC to RAM]
Control Line Value
4-bit Binary Keyboard (Address Bus) X
Write 0
Read 1
ACC to Data Bus 1
Load ACC 0
/~A_Only 1
/~Invert 1
Logic/~Arith 1

 

Table 9
Instruction[ Not (operand) to ACC]

(1’s complement)

Control Line Value
4-bit Binary Keyboard (Address Bus) 3
Write 1
Read 0
ACC to Data Bus 0
Load ACC 1
/~A_Only 1
/~Invert 0
Logic/~Arith 0
Instruction[ Negate(operand) to ACC]

(2’s complement)

Control Line Value
4-bit Binary Keyboard (Address Bus) 3
Write 1
Read 0
ACC to Data Bus 0
Load ACC 1
/~A_Only 0
/~Invert 0
Logic/~Arith 1

 

Task 4-9: Build the Memory-Address-Generation Circuit

Include a picture of your Logisim memory address generation circuit here:

 

Task 4-10: Build the Controller Circuit

Include a picture of your Logisim controller circuit here:

 

Task 4-11: Build the Complete Microprocessor Circuit

Include a picture of your Logisim complete microprocessor circuit, with controller, here:

 

Task 4-12: Write and Execute a Simple Program for Your Microprocessor

Write the program given in your laboratory manual into the appropriate memory locations. Observe the operation of each step of your program (i.e. observe the values of the control lines and record whether data is being moved properly according to those control line settings). Did you get an 8 stored into the accumulator with you initial test?______

If not, what error(s) did you find during your debugging process?________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

 

Task 4-13: Add the ‘AND’, ‘Zero’, ‘Subtract’, and ‘Store ACC’ Instructions

 

Use Table 10and Table 11to enter your values into the microinstruction definition table for each of the four instructions asked for in the laboratory manual. Be sure to label the name of each and every instruction.

Table10
Instruction
Opcode 3 4
Pres. State 00 01 02 03 00 01 02 03
Description Pin number
Next State Bits 1-0
Load IR 2
Write 3
Read 4
ACC to Data Bus 5
Load ACC 6
Load MAR 7
Use PC 8
/~A_only 9
/~Invert 10
Logic/~Arith 11
X 12
X 13
X 14
X 15
HEX equiv

 

Table11
Instruction
Opcode 5 6
Pres. State 00 01 02 03 00 01 02 03
Description Pin number
Next State Bits 1-0
Load IR 2
Write 3
Read 4
ACC to Data Bus 5
Load ACC 6
Load MAR 7
Use PC 8
/~A_only 9
/~Invert 10
Logic/~Arith 11
X 12
X 13
X 14
X 15
HEX equiv

Test your instructions by writing and executing programs. Record at least four programs and the output of each program in tables like that of Table 12.

Table12
Program #0 ( Example: ADD = 3+5)
Address Value Operation (In English)
0 0 The ‘Load ACC’ Opcode
1 3 The number ‘3’ to be loaded into the Accumulator
2 1 The ‘Add to ACC’ Opcode
3 5 The number ‘5’ to be added to the Accumulator
4 2 The ‘Stop’ Opcode
What was the final output of your program? ___8__
Was the program successful? YES_
If not what error(s) did you find in your circuit?

 

Program # ( )
Address Value Operation (In English)
What was the final output of your program? _____
Was the program successful? Yes or No_
If not what error(s) did you find in your circuit?

 

Task 4-14: Invent Your Own Instruction (Extra Credit)

Fill in the following two tables for your invented instruction.

Instruction
Opcode 7
Pres. State 00 01 02 03 00 01 02 03
Description Pin number
Next State Bits 1-0
Load IR 2
Write 3
Read 4
ACC to Data Bus 5
Load ACC 6
Load MAR 7
Use PC 8
/~A_only 9
/~Invert 10
Logic/~Arith 11
X 12
X 13
X 14
X 15
HEX equiv

 

Program # ( )
Address Value Operation (In English)
What was the final output of your program? _____
Was the program successful? Yes or No_
If not what error(s) did you find in your circuit?

Simulation Lab 4: Lab Report Grade Sheet

Name:

Instructor Assessment: Task Oriented

Grading Criteria MaxPoints Points Lost
Template
Neatness, Clarity, and Concision 2
Description of Assigned Tasks, Work Performed & Outcomes Met
Task 4-1: Build the Brainless Central Processing Unit 5
Task 4-2: Test and Control the Brainless Central Processing Unit 12
Task 4-3: Build the Addressing Logic 3
Task 4-4: Build a 4-Bit ROM Memory Cell 3
Task 4-5: Build 4-Bit Output Port 3
Task 4-6: Build the 4-Bit RAM Cell 3
Task 4-7: Build the Brainless Microprocessor 10
Task 4-8: Testing and Controlling the Brainless Microprocessor 14
Task 4-9: Build the Memory-Address-Generation Circuit 5
Task 4-10: Build the Controller Circuit 5
Task 4-11: Build the Complete Microprocessor Circuit 10
Task 4-12: Write and Execute a Simple Program for your Microprocessor 5
Task 4-13: Add the ‘AND’, ‘Zero’, ‘Subtract’, and ‘Store ACC’ Instructions 20
Task 4-14: Invent Your Own Instruction (5 extra points)
Self-Assessment Worksheet (The content of the self-assessment worksheet will not be graded. Full credit is given for including the completed worksheet.) (2 extra points)
Points Lost
Lab Score Late Lab
Lab Score

Self-Assessment Worksheet

Put ‘X’s’ in the table below indicating how strongly you agree or disagree that the outcomes of the assigned tasks were achieved. Use ‘5’ to indicate that you ‘strongly agree’, ‘3’ to indicate that you are ‘neutral’, and ‘1’ to indicate that you ‘strongly disagree’. Use ‘NA’, ‘Not Applicable’, when the tasks you performed did not elicit this outcome. Credit will be given for including this worksheet with your lab report; however, your responses will not be graded. They are for your instructor’s information only.

 

Table 14: Self-Assessment of Outcomes for Simulation Lab 4: The Brainless Microprocessor

After completing the assigned tasks and report, I am able to: 5 4 3 2 1 NA
Build, debug and control a simulation of a central processing unit (CPU) X
Build, debug and control a simulation of a ROM, RAM and an output port. X
Build and debug a simulation of a microprocessor that is absent a controller. X
Act as the controller for an elementary microprocessor. X
Design a PROM-based controller for an elementary microprocessor. X
Create an instruction set for an elementary microprocessor. X
Use the language of your instruction set to create a program and enter it into memory. X
Execute a program on your simulated microprocessor. X

Write below any suggestions you have for improving this laboratory exercise so that the stated learning outcomes are achieved.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Programming Langauge Help

Programming Languages CMP 339/692 Exam #3 – Chapters 8, 9 and 10 Extra Credit Name:__________________________

12/11/2013 Page 1 of 2

Multiple Choice (worth 2 points each)

Short Answer (worth 10 points each)

1. What are the arguments both for and against the exclusive use of Boolean expressions in the

control statements in Java (as opposed to also allowing arithmetic expressions, as in C++)?

 

2. What are arguments for and against a user program building additional definitions for

existing operators, as can be done in Python and C++? Do you think such user-defined

operator overloading is good or bad? Support your answer.

 

Programming Languages CMP 339/692 Exam #3 – Chapters 8, 9 and 10 Extra Credit

12/11/2013 Page 2 of 2

3. Although local variables in Java methods are dynamically allocated at the beginning of each

activation, under what circumstances could the value of a local variable in a particular

activation retain the value of the previous activation?

 

 

4. If a compiler uses the static chain approach to implementing blocks, which of the entries in

the activation records for subprograms are needed in the activation records for blocks?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

HW IN Distributed Data Base

CS 627 – Distributed Database Systems – Spring ’14

Homework # 2 (100 Points)

Hand in this paper as your cover page (-10 points if missing)

 

 

Name________________________________________

 

1.) Allocation (40 points)

We are implementing a distributed database for a business. The database schema is in the appendix. The business is located in five different locations (located in DEPT_LOCATIONS table).

 

Based on the fragments you created in question 1 from homework 1, explain the following:

 

1. What considerations must be made to allocate this data?

 

2. What information do we need to perform a proper analysis of allocation?

 

3. Why would we allocate to site X as opposed to site Y?

 

2.) Bottom Up Design (10 points)

1. We discussed three steps in generating the global conceptual schema.

 

2. Why can we not match and map at the same time?

 

3. Why are they different steps?

 

3.) Query Processing (50 points)

1. Explain why processing is a necessary step in databases.

 

2. Why do we need to translate our SQL into relational algebra?

 

3. Why not allow database programmers to write directly in relational algebra instead of SQL?

 

4. How does distributed processing differ from centralized processing?

 

 

Appendix fig05_06

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Spreadsheet Homework Assignment

Purchase

Vehicle Purchase Analysis
Vehicle 1 Vehicle 2 Vehicle 3 Vehicle 4 Average Highest Lowest
Description 2011 Ford Mustang GT 2012 Honda Civic LX 2013 Ducati Superbike 848 Evo 2012 GMC Canyon Regular Cab Price
Vehicle Type Passenger Passenger Motorcycle Truck MPG City
MPG Highway
Seller private seller dealer private seller dealer MPG Average
Price $25,490 $17,998 $13,995 $17,475
MPG City 19 29 44 18 Yearly Costs Average Highest Lowest
MPG Highway 31 41 44 25 Maintenance
Average MPG Registration Fee
Yearly Costs Insurance
Maintenance/Year $600 $300 $500 $500
Registration Fee Loan Average Highest Lowest
Insurance/Year $1,000 $700 $1,500 $600 Amount to Borrow
Need Loan? APR
Amount to Borrow Years
APR 4.90% 1.90% 7.90% 3.90%
Years 5 4 2 3 Monthly Costs Average Highest Lowest
Monthly Costs Gas
Gas Loan Payment
Loan Payment Maintenance
Maintenance/Month Insurance
Insurance/Month Total Monthly
Total Monthly
Affordable?

Assumptions

Vehicle Purchase Assumptions
$5,000 Total Cash Available for Vehicle Purchase
$600 Total Monthly Amount Available to Pay for Operating Vehicle
600 Number of Miles I Expect To Drive Each Month
$3.65 Gas Price Per Gallon
Registration Fee Lookup Table
column # 1 2
Cargo Van 100
Farm Vehicle 68
Motor Home 100
Motorcycle 60
Passenger 100
Taxicab 160
Trailer 30
Truck 100
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science Application FRQ Paragraph Questions

A big part of using classes in Java is thinking about the  design of the class. You’ll need to figure out what information  needs to be in the blueprint. So far we’ve seen a handful  of examples. In our Rectangle class, we needed to know the  width and height. For our Student class, we needed to know  the first name, last name, and grade level.

This exercise is a free response question. Imagine that someone comes  to you and asks you to design a class that represents a  Pizza. What instance variables should the Pizza class have?  Why? What are the types of those instance variables?

 

___________________________________________________________________________

 

Your job in this exercise is write down some of the differences between objects and primitives.  What is an object, and what is a primitive?  How are they stored differently?  How do we compare objects to each other? How do we compare primitives to each other?

Write down your answers to these questions in the space provided. If you need a refresher on the differences between objects and primitives, rewatch the Objects vs Primitives video.

___________________________________________________________________________

 

Data Structures are a fundamental building block of programming and computer science. Not surprisingly, they are a crucial part of the Java programming language. In any application that you use, there are data structures at work behind the scenes.

Choosing data structures and designing classes are often the most important decisions you’ll make when writing a large program. For example, think about your cell phone – how should it store your text messages? How should it store all the apps on your phone? And what about the location of the apps? And your phone book?

Online mapping applications are another great example. If you want to look up a location, how should the mapping program store that location? What data structures does the application need in order to find directions from one place to another?

In this exercise, you should come up with some software application you use (a website, game, or other application) and write a few paragraphs describing what data structures you think it uses behind the scenes to make it work.

___________________________________________________________________________

 

An algorithm is a step-by-step process to solve a problem. In this course you will program the computer to execute an algorithm, but you could also see an algorithm as something you do every day.

Come up with an example of an algorithm from your every day life and write a few paragraphs explaining the process, the problem, and the algorithm.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Spreadsheet Homework Assignment

Purchase

Vehicle Purchase Analysis
Vehicle 1 Vehicle 2 Vehicle 3 Vehicle 4 Average Highest Lowest
Description 2011 Ford Mustang GT 2012 Honda Civic LX 2013 Ducati Superbike 848 Evo 2012 GMC Canyon Regular Cab Price
Vehicle Type Passenger Passenger Motorcycle Truck MPG City
MPG Highway
Seller private seller dealer private seller dealer MPG Average
Price $25,490 $17,998 $13,995 $17,475
MPG City 19 29 44 18 Yearly Costs Average Highest Lowest
MPG Highway 31 41 44 25 Maintenance
Average MPG Registration Fee
Yearly Costs Insurance
Maintenance/Year $600 $300 $500 $500
Registration Fee Loan Average Highest Lowest
Insurance/Year $1,000 $700 $1,500 $600 Amount to Borrow
Need Loan? APR
Amount to Borrow Years
APR 4.90% 1.90% 7.90% 3.90%
Years 5 4 2 3 Monthly Costs Average Highest Lowest
Monthly Costs Gas
Gas Loan Payment
Loan Payment Maintenance
Maintenance/Month Insurance
Insurance/Month Total Monthly
Total Monthly
Affordable?

Assumptions

Vehicle Purchase Assumptions
$5,000 Total Cash Available for Vehicle Purchase
$600 Total Monthly Amount Available to Pay for Operating Vehicle
600 Number of Miles I Expect To Drive Each Month
$3.65 Gas Price Per Gallon
Registration Fee Lookup Table
column # 1 2
Cargo Van 100
Farm Vehicle 68
Motor Home 100
Motorcycle 60
Passenger 100
Taxicab 160
Trailer 30
Truck 100
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science: Application Code FRQ

AP Java FRQ: Combination Lock Game

 

Directions: SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN Java.

 

Notes:

· Assume that the classes listed in the Quick Reference have been imported where needed.

· Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.

· In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods may not receive full credit.

 

Consider a game with a combination lock box that has a 4-letter word as the combination. A player tries to guess the combination by guessing one letter at a time to win a prize inside the box. The combination only contains 4 lower-case letters. A guess is one lower-case letter.

 

For each round of play, the player is given a binary clue (yes/no) based on a comparison between the combination lock and the guess. If the letter that the player guesses is in the combination lock word, the player gets a binary clue (yes/no) that says “yes”; if the letter that the player guesses is NOT in the combination lock word, the clue is “no”.

 

The CombinationLock class will be used to represent the combination lock in the game. The combination lock is passed to the constructor. The class contains a method, getClue, that takes a guess and produces a clue.

 

For example, suppose the variable comboLock is declared as follows:

 

CombinationLock comboLock = new CombinationLock(“frog”);

 

If a player guesses “f”, then the binary clue would be “yes”; if the player guesses “t”, then the binary clue would be “no”.

 

Write the complete CombinationLock class, including any required instance variables, its constructor, and the method getClue, described above.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MARIE Simulator Help Needed. Must Use MARIE Simulator

Project 2 MARIE Start code at bottom of document

1. Introduction

The objective of this project is to reinforce your understanding of computer organization, instruction set architectures, and assembly language. You will accomplish this by writing, analyzing, and debugging an assembly language program for the MARIE processor.

You must: (i) design and write an assembly language program for the MARIE processor that inputs, transforms, stores, and then outputs a sequence of characters from the set A-Z; (ii) debug and test your program by simulating it using the MARIE simulator; (iii) document your work in a short report; and (iv) submit the report file (*.pdf), assembler source file (*.mas), assembler listing file (*.lst), and assembler executable file (*.mex).

2. The MARIE Simulator

The MARIE simulator is provided as a zip file containing Java archives (*.jar) files, documentation, and example source files. Unzip the file to a directory for use. Do the following to become familiar with the MARIE simulator

3. Design Specification

You are to design, write, test, and debug a MARIE assembly language program that inputs a sequence of characters from the set A-Z (capital letters only), stores each character in memory after it is transformed by the trivial ROT13 cipher, and then, after character input completes, outputs the transformed characters.

A template source code file (Project-2_Start.mas) is provided with this assignment. Edit this file to create a program that meets the program specifications. Note that the template includes instructions to initialize some working values that your program can use. The template also defines memory locations. You may add data memory locations. The program can be designed without additional data locations, but it may be necessary to do so for your design.

For full credit, your solution must perform the functions and satisfy the requirements specified below.

a) The first instruction of the program must be placed at location (address) 0x100 (100 hexadecimal) in MARIE’s memory. This is accomplished by following the program template that is provided.

b) The constant data values (One, ChA, ChZ, ChPer, Val13, Start) should not be changed by the program. The program can load from these memory locations, but should not store to them.

c) Transformed input characters must be stored in successive memory locations beginning at location 0x200 (200 hexadecimal) as indicated in the program template. The program should store all transformed input characters before any characters are output.

d) The program should always initialize the values for Ptr in the working data memory and not rely on the values for these locations that are defined in the assembly source file. This initialization is done by the provided template file.

e) The program should work for any inputs ‘A’ through ‘Z’ and ‘.’ (a period terminates input). In the interest of keeping the program simple, the program does not need to validate inputs.

f) When transformed characters are stored and when transformed characters are output, the program must use a loop and indirect addressing to access the values in the array of words. Note that variable Ptr is initialized in the template code and should be used in the loop. You may also define a Count variable to count the number of characters, but there are also correct designs that do not require a Count variable.

g) The program should operate as follows. Input Phase:

1. A character (A-Z or ‘.’) is input. MarieSim allows the user to input a single character that is read into the accumulator (AC) with an Input instruction.

2. If character ‘.’ (period) is input, then the input phase ends and the output phase begins (step 5 below). (The period may be stored in memory to mark the

end of the characters or the characters can be counted to determine how many transformed characters to output during the output phase.)

3. The character that is input is transformed using the trivial ROT13 cipher (see Section 5.1).

4. The transformed character is stored in the next location in the block of memory beginning at location Start. (Variable Ptr must be updated and indirect memory addressing must be used.)

Output Phase:

5. All transformed characters are output, beginning with the first character that was transformed. The ‘.’ character is not to be output. (This will require a loop using variable Ptr and indirect addressing. Note that the number of characters to output will vary and the program must know when to stop the output by relying on a ‘.’ or other special character in memory, counting the number of input characters during the input phase, or some other method.)

6. After all characters are output, the program halts by executing the HALT

instruction.

4. Testing

Test and debug the program using the MARIE simulator (MarieSim.jar). Debug the program using the “Step” and “Breakpoint” features of the simulator. You must test your program with the following two test cases.

Test 1: Input the eight-character sequence “VIRGINIA” followed by a ‘.’ to terminate the input. Note that you need to input one character at a time into MarieSim’s ASCII Input area, with each character followed by pressing the “Enter” key. The ROT13 value of each character (“IVETVAVN”) should be displayed after the ‘.’ character is input.

Test 2: Reload the program in MarieSim, without reassembling, input the four-character sequence “GRPU” followed by a ‘.’ To terminate the input. Note the output.

When you create your source file within MarieSim (using the File > Edit menu pick), use file name lastname_firstname_P2.mas, where “lastname” is your last or family name and “firstname” is your first or given name. You can assemble your source file in the editor program. The assembly process creates a listing file (lastname_firstname_P2.lst) and an executable file (lastname_firstname_P2.mex). Load the executables file into the simulator for execution.

5. Design Notes

5.1. he ROT13 Cipher

The ROT13 cipher (see http://en.wikipedia.org/wiki/ROT13) is an old, but trivial cipher that simply rotates the characters by 13 positions. For example, ‘A’ is transformed to ‘N’ and ‘Z’ is transformed to ‘M’.

The Project-2_Start.mas source file includes a ROT13 subroutine that almost performs this transformation. You need to fix one bug in the subroutine.

/ *****

/ This is starting code for Project 2 for ECE 5484, Fall 2016

/ Remove this header and identify your project name and your name.

/ *****

ORG 100 / Start the program at location 100 hexadecimal

/ —–

/ Input characters, transform, and store in memory until ‘.’ is input

/ —–

Load Start / Initialize character pointer to start of block

Store Ptr

/>>>>> Add code to accomplish the input and output phases. <<<<<

Input InVal

/>>>>> Here’s an example of how subroutine ROT13 is called. <<<<<

/>>>>> We’ll just transform ‘A’ in this example then halt. <<<<<

Load ChA / Put ‘A’ in AC

Store InVal / Store value to be transformed into InVal

Jns ROT13 / Jump to the ROT13 subroutine

/ Upon return, the transformed character is in AC

Halt

/ —–

/ Rotate-13 subroutine: Apply ROT13 to input character in location InVal and return in AC

/ —–

/>>>>> WARNING: This subroutine *almost* works. You need to fix a bug.

ROT13, HEX 0

Load InVal / Get character

Add Val13 / Add 13

Store Hold / Save it

Subt ChZ / Check if modulo adjust is needed (past ‘Z’)

Skipcond 800 / No adjust needed if past ‘Z’

Jump NoAdj

Add ChA / Add ‘A’ back to difference to perform modulo

Jump Done / Result is in AC

NoAdj, Load Hold / No adjust needed, get result

Done, JumpI ROT13 / Return with result in AC

/ —–

/ Constants (the program should not write to these locations)

/ —–

ChA, HEX 0041 / Constant value ‘A’ for modulo adjust in subroutine

ChZ, HEX 005A / Constant value ‘Z’ for modulo check in subroutine

ChPe, HEX 2E / Constant period character that marks end of input

Val13, DEC 13 / Constant rotate value of 13 for subroutine

One, HEX 1 / Constant value 1

Start, HEX 200 / Constant address for start of character block

/ —–

/ Data area (these locations are for reading and writing)

/ —–

InVal, HEX 0 / Reserved for subroutine input value

Hold, HEX 0 / Reserved for temporary variable for subroutine

Ptr, HEX 0 / Reserved for character pointer

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Module 2 Discussion(DR)

Module 2 Discussion Forum

Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 2 Discussion Question

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion?

Reply -1 (Praneeth)

 

Chevron infrastructure is one of the largest energy companies who uses seismic imagine technologies in their corporation which helps them to improve the efficiency of the process and give best outcomes. Since, risks and uncertainties are the part of the recent days business world this organization take all the security mechanism which helps them to protect the business networks. They implemented the contingency plan for the organization, which helps them to continue the business operations as long as possible to face the business risks and uncertainties.

End users plays a crucial role in the contingency plan, end users involved in the development of contingency plans and design the best security mechanisms to control the effects of the uncertainties and risk. End user is the person responsible for taking care of the entire contingency plan and design the effective system to meet the business objectives. They use all the strategic and business plans to target the key areas of the organization. Contingency plan is the best course of action that organization prefer so that they can quickly respond to the business emergencies and unplanned events like disasters.

Along with the several advantages of involving end users in contingency plan, have couple of pitfalls and other issues. End users designed tools and applications for the contingency plans, often they failed to respond during the disasters and unplanned business events. On the other hands contingency plan sometimes referred as the ultimate options for the organization and keep it as plan B. In such cases, end users show less interest to the business call and that effects directly to the end objective of the business. End users show less organizational responsibility in the contingency plan for maintaining the complete program. Security and other control may not be adequate and faces issues to safeguard the networks of the business during the unplanned business events.

References:

Fallara, P. Disaster Recovery Planning. IEEE Potentials (Volume: 23, Issue: 5, Dec. 2003-Jan.  2004). DOI: 10.1109/MP.2004. 1301248.

Meshal, A. (2016). Disaster Recovery and Business Continuity. International Journal of Scientific and Engineering research, Volume 7, Issue 3, March 2016.

Philips, B. (2005). Disaster as a Discipline: The Status of Emergency Management Education in  the US. International Journal of Mass-Emergencies and Disaster, 111-140.

Reply-2(Ravikanth)

 

Organizational readiness for change is a multi-level construct. Readiness can be more or less present at the individual, group, unit, department, or organizational level. Readiness can be theorized, assessed, and studied at any of these levels of analysis. However, organizational readiness for change is not a homologous multi-level construct. That is, the construct’s meaning, measurement, and relationships with other variables differ across levels of analysis. Below, I focus on organizational readiness for change as a supra-individual state of affairs and theorize about its organizational determinants and organizational outcomes.

Organizational readiness for change is not only a multi-level construct, but a multi-faceted one. Specifically, organizational readiness refers to organizational members’ change commitment and change efficacy to implement organizational change. This definition followed the ordinary language use of the term ‘readiness,’ which connotes a state of being both psychologically and behaviorally prepared to take action (i.e., willing and able). Similar to Bandura’s  notion of goal commitment, change commitment to change refers to organizational members’ shared resolve to pursue the courses of action involved in change implementation. I emphasize shared resolve because implementing complex organizational changes involves collective action by many people, each of whom contributes something to the implementation effort. Because implementation is often a ‘team sport,’ problems arise when some feel committed to implementation but others do not. Herscovitch and Meyer observe that organizational members can commit to implementing an organizational change because they want to (they value the change), because they have to (they have little choice), or because they ought to (they feel obliged). Commitment based on ‘want to’ motives reflects the highest level of commitment to implement organizational change.

Reference:

  1. Amatayakul M. EHR? Assess readiness first. Healthc Financ Manage. 2005;
  2. Armenakis AA, Harris SG, Mossholder KW. Creating readiness for organizational change. Human Relations. 1993;46:681–703. doi: 10.1177/001872679304600601
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Read The Case Study “Creating A Methodology” On Page 108 And Then Answer One (1) Of The Questions On Page 110

Truly, PMO can quicken the execution procedure. PMO remains for Project Management office and yes we require in any association .The PMO total incorporates a pinch of get-together of individuals from various divisions in a connection and this social gathering need to pick a Leader and worked with him to get destinations and measures of accomplishment. PMO hoard must give a report that must unite information financing, resourcing, destinations, criteria for advance, and affiliation and this must be trailed by the Real time Management gathering. The point of confinement of a task association relationship to add to the accomplishment of its parent firm relies on various elements including the change of its undertaking association limits. Low headway venture association affiliations tend to expect a supporting part reliably focused on process consistence and on separating, while more make affiliations can relate unmistakable capacities to drive an impulse from ventures and the portfolio, and to acknowledge a much extended part including structure definition, asset dissemination and association of outsourcing.

Change is a choice that is other than understanding. It have some particular strategy of breaking points. An association’s undertaking association change might be surveyed by pondering the quality and movement of key characteristics, for example, techniques and culture. Working theory, how adjusted are ventures and the portfolio to a connection’s basic objectives Processes – how fitting, persevering and serious are the affiliation’s task association outlines Culture – how unquestionably knew is PPRM and what does the alliance do to draw in and create extraordinary practices Information building – does the alliance have masterminded access to and impact amazing utilization of undertaking data for fundamental activity Organization to design – are parts and duties without a doubt depicted Performance association – how well does the firm measure respect creation and how well does it compensate social affairs and people for duty.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!