(Solved) : 1 1 Pt Circle Applicable Statement Arm Cortex M4 Cpu Cisc B Risc Hybrid Cisc Risc C 2 3 Pt Q38846075 . . .

1. (1 pt.) Circle all that are applicable for this statement: Arm Cortex M4 CPU is a) CISC b) RISC Hybrid of CISC and RISC c)

1. (1 pt.) Circle all that are applicable for this statement: Arm Cortex M4 CPU is a) CISC b) RISC Hybrid of CISC and RISC c) 2. (3 pts.) Fill in the blank(s) for the following questions: a) Arm Cortex M4 has and a second one to access the program _ separate data buses: one for accessing the program bits b) The data bus size between the ARM Cortex M4 CPU and the external memory is ARM Cortex M4 register file has programmer visible general purpose registers each of which is_bits in size. c) 3. (6 pts.) Please provide brief, yet complete and precise, answers to questions in this section a) What does it mean to say the SW1 switch on the Tiva board is negative logic? Briefly explain Answer: Show transcribed image text 1. (1 pt.) Circle all that are applicable for this statement: Arm Cortex M4 CPU is a) CISC b) RISC Hybrid of CISC and RISC c) 2. (3 pts.) Fill in the blank(s) for the following questions: a) Arm Cortex M4 has and a second one to access the program _ separate data buses: one for accessing the program bits b) The data bus size between the ARM Cortex M4 CPU and the external memory is ARM Cortex M4 register file has programmer visible general purpose registers each of which is_bits in size. c) 3. (6 pts.) Please provide brief, yet complete and precise, answers to questions in this section a) What does it mean to say the SW1 switch on the Tiva board is negative logic? Briefly explain Answer:

Expert Answer


Answer to 1. (1 pt.) Circle all that are applicable for this statement: Arm Cortex M4 CPU is a) CISC b) RISC Hybrid of CISC and RI...

(Solved) : 01 193 Assignments Secret Code Secret Code File Types Py File Upload Due Thursday 11 59pm Q38805840 . . .


01-193 Assignments Secret Code Secret Code File Types py a file upload Due Thursday by 11:59pm Available Jun 18 at 12am- Junenter string to encrypt: congratulations c211 o 14 9 n 13 5 g 6 24 r 177 a0 15 t 19 17 u 20 1 111 23 a 0 15 t 19 17 i80 o 1401-193 Assignments Secret Code Secret Code File Types py a file upload Due Thursday by 11:59pm Available Jun 18 at 12am- Jun 28 at 11:59pm 11 days Points 100 Submitting Create a program that will encrypt letters and create a secret code. You will create an array of numbers from 0-25. use li for i in range (26)] to create an array of numbers from 0-25. use random.shuffle to to shuffle the above array. This will be used for a new letter index order. For example: The first created array [0, 1,2,3, 4,5, 6,7,8,9,10, 11, 12, 13,14, 15, 16, 17,18, 19,20, 21, 22, 23, 24, 25 n gets shuffled to become [2, 14, 12, 20, 16, 5, 11, 1, 13, 17, 15,21, 19, 10,23,22, 25, 3, 6,7, 18,4,9,24,0,8) This will be used as the new index for the encrypted alphabet. create an array of letters using list(string.ascii_lowercase), this requires importing the string module. This will create: l'a', 'b','c, d; 'e', f. 'g, 'h', '. J, 'k', 'T, 'm, 'n', 'o, 'p, 'q, 'r" Accept an input of a word. Using the above tables take each letter of the word and convert it to the encrypted le Print each letter with the existing letter value and the encrypted letter value. Print the newly encrypted word. Flowchart: Secret Code-1.pdf Sample output: enter string to encrypt: congratulations c211 o 14 9 n 13 5 g 6 24 r 177 a0 15 t 19 17 u 20 1 111 23 a 0 15 t 19 17 i80 o 14 9 n 13 5 s 18 16 lifyhprbxprajfq >>> Extra credit include a space as an encrypted character and allow for multiple words. Show transcribed image text 01-193 Assignments Secret Code Secret Code File Types py a file upload Due Thursday by 11:59pm Available Jun 18 at 12am- Jun 28 at 11:59pm 11 days Points 100 Submitting Create a program that will encrypt letters and create a secret code. You will create an array of numbers from 0-25. use li for i in range (26)] to create an array of numbers from 0-25. use random.shuffle to to shuffle the above array. This will be used for a new letter index order. For example: The first created array [0, 1,2,3, 4,5, 6,7,8,9,10, 11, 12, 13,14, 15, 16, 17,18, 19,20, 21, 22, 23, 24, 25 n gets shuffled to become [2, 14, 12, 20, 16, 5, 11, 1, 13, 17, 15,21, 19, 10,23,22, 25, 3, 6,7, 18,4,9,24,0,8) This will be used as the new index for the encrypted alphabet. create an array of letters using list(string.ascii_lowercase), this requires importing the string module. This will create: l'a', 'b','c, d; 'e', f. 'g, 'h', '. J, 'k', 'T, 'm, 'n', 'o, 'p, 'q, 'r" Accept an input of a word. Using the above tables take each letter of the word and convert it to the encrypted le Print each letter with the existing letter value and the encrypted letter value. Print the newly encrypted word. Flowchart: Secret Code-1.pdf Sample output:
enter string to encrypt: congratulations c211 o 14 9 n 13 5 g 6 24 r 177 a0 15 t 19 17 u 20 1 111 23 a 0 15 t 19 17 i80 o 14 9 n 13 5 s 18 16 lifyhprbxprajfq >>> Extra credit include a space as an encrypted character and allow for multiple words.

Expert Answer


Answer to 01-193 Assignments Secret Code Secret Code File Types py a file upload Due Thursday by 11:59pm Available Jun 18 at 12am-...

(Solved) : 01330g Consider Language B 3j J 3i 1 J 1 Two Shortest Strings Language Q38815584 . . .

01330G. Consider the language {a b i 3j or j 3i, i >= 1, j>= 1}. a. What are the two shortest strings in the above language

01330G. Consider the language {a' b' i 3j or j 3i, i >= 1, j>= 1}. a. What are the two shortest strings in the above language? Show transcribed image text 01330G. Consider the language {a' b' i 3j or j 3i, i >= 1, j>= 1}. a. What are the two shortest strings in the above language?

Expert Answer


Answer to 01330G. Consider the language {a' b' i 3j or j 3i, i >= 1, j>= 1}. a. What are the two shortest strings in the above lan...

(Solved) : 0 2 B 1 3 6 7 8 10 11 12 M 13 14 15 P 16 17 18 19 S 22 23 20 U T 21 E 24 X 25 F G H K N O Q38818547 . . .


0 2 B 1 3 A 6 7 8 10 11 12 M 13 14 15 P 16 17 18 19 S 22 23 20 U T 21 A E 24 X 25 F G H K N O R V W Y 7 Given the above table0 2 B 1 3 A 6 7 8 10 11 12 M 13 14 15 P 16 17 18 19 S 22 23 20 U T 21 A E 24 X 25 F G H K N O R V W Y 7 Given the above table, write the ciphertext for the message "SECURITY" if the key is 4. Answer: Show transcribed image text 0 2 B 1 3 A 6 7 8 10 11 12 M 13 14 15 P 16 17 18 19 S 22 23 20 U T 21 A E 24 X 25 F G H K N O R V W Y 7 Given the above table, write the ciphertext for the message "SECURITY" if the key is 4. Answer:

Expert Answer


Answer to 0 2 B 1 3 A 6 7 8 10 11 12 M 13 14 15 P 16 17 18 19 S 22 23 20 U T 21 A E 24 X 25 F G H K N O R V W Y 7 Given the above ...

(Solved) : 0 N2 9 Summation Series Given Equation Y 1 Assume Variable Non Zero Positive Integer Stor Q38857334 . . .

ΣΗ-0(n2 9. Summation of a series is given by the equation y = 1). Assume variable a is a non-zero positive integer and is sto

-------------------------

please comment the code

ΣΗ-0(n2 9. Summation of a series is given by the equation y = 1). Assume variable a is a non-zero positive integer and is stored in X19. Store the computed output y in X20. Write a LEGV8 assembly code to compute y using recursion. Use the stack to store all the temp and saved registers used in the function and comment your code. [Hint: Please write the C code for the above problem using recursion and try to convert it to assembly code] (15 Points) Show transcribed image text ΣΗ-0(n2 9. Summation of a series is given by the equation y = 1). Assume variable a is a non-zero positive integer and is stored in X19. Store the computed output y in X20. Write a LEGV8 assembly code to compute y using recursion. Use the stack to store all the temp and saved registers used in the function and comment your code. [Hint: Please write the C code for the above problem using recursion and try to convert it to assembly code] (15 Points)

Expert Answer


Answer to ΣΗ-0(n2 9. Summation of a series is given by the equation y = 1). Assume variable a is a non-zero positive integer and...

(Solved) : Trace Breadth First Search Graph Starting Leftmost Vertex One Edges Costing 4 6 16 Coming Q38844511 . . .

4 6 18 5 11 16 10 14 21 24 23 LO

a. Trace through Breadth-First Search of this graph starting atthe leftmost vertex (the one with edges costing 4,6,16 coming fromit). Show the distances of each vertex from the start vertex (Notethat you won’t need the weights for this one)
b. Trace through either Prim’s and Kruskal’s MST algorithms on thisgraph (your choice), showing the graph after each iteration. Ifyou’re using Prim, start at the leftmost vertex again

4 6 18 5 11 16 10 14 21 24 23 LO Show transcribed image text 4 6 18 5 11 16 10 14 21 24 23 LO

Expert Answer


Answer to a. Trace through Breadth-First Search of this graph starting at the leftmost vertex (the one with edges costing 4,6,16 c...

(Solved) : 0 125 Pts Correct Question 4 Select Best Answer Atcp Client Receives Segment Contains Segm Q38808553 . . .

provide the right answers and show your work
0/12.5 pts correct Question 4 Select the best answer ATCP client receives a segment that contains a segment with 5 bytes of d0/12.5pts Incorrect Question 5 Select the best answer A server sends a 1000 bytes segment with sequence number 3500. The clieIncorrect 0/12.5 pts Question 6 Select the best answer. A TCP client recelves a segment that contains a segment with 10 bytesIncorrect 0/12.5 pts Question 7 Select the best answer. A server sends a 10 bytes segment with sequence number 0. The clientIncorrect 0/12.5 pts Question 8 Select the best answer. ATCP client receives a segment that contains a segment with 1000 byte0/12.5 pts correct Question 4 Select the best answer ATCP client receives a segment that contains a segment with 5 bytes of data with Sequence number 10. This TCP client will acknowledge this segment with an ack number equal to 16 None of these answers 15 0/12.5pts Incorrect Question 5 Select the best answer A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond most likely with Sequence number None of these cholces 4500 4501 3500 3501 Incorrect 0/12.5 pts Question 6 Select the best answer. A TCP client recelves a segment that contains a segment with 10 bytes of data with Sequence number 6. This TCP client will acknowledge this segment with an ack number equal to 15 None of these answers 16 Incorrect 0/12.5 pts Question 7 Select the best answer. A server sends a 10 bytes segment with sequence number 0. The client receives it correctly. The client will respond with Sequence number 10 11 1 None of these choices Incorrect 0/12.5 pts Question 8 Select the best answer. ATCP client receives a segment that contains a segment with 1000 bytes of data with Sequence number 0. This TCP client will acknowledge this segment with an ack number equal to 1000 None of these answers 1001 Show transcribed image text 0/12.5 pts correct Question 4 Select the best answer ATCP client receives a segment that contains a segment with 5 bytes of data with Sequence number 10. This TCP client will acknowledge this segment with an ack number equal to 16 None of these answers 15
0/12.5pts Incorrect Question 5 Select the best answer A server sends a 1000 bytes segment with sequence number 3500. The client receives it correctly. The client will respond most likely with Sequence number None of these cholces 4500 4501 3500 3501
Incorrect 0/12.5 pts Question 6 Select the best answer. A TCP client recelves a segment that contains a segment with 10 bytes of data with Sequence number 6. This TCP client will acknowledge this segment with an ack number equal to 15 None of these answers 16
Incorrect 0/12.5 pts Question 7 Select the best answer. A server sends a 10 bytes segment with sequence number 0. The client receives it correctly. The client will respond with Sequence number 10 11 1 None of these choices
Incorrect 0/12.5 pts Question 8 Select the best answer. ATCP client receives a segment that contains a segment with 1000 bytes of data with Sequence number 0. This TCP client will acknowledge this segment with an ack number equal to 1000 None of these answers 1001

Expert Answer


Answer to 0/12.5 pts correct Question 4 Select the best answer ATCP client receives a segment that contains a segment with 5 bytes...

(Solved) : Show N2 4n 17 O N2 Providing Appropriate Values C N0 Showing Fits Definition B Show N2 4n Q38844225 . . .

a. Show that n2 + 4n + 17 is O(n2) by providing appropriatevalues of c and n0 and showing how it fits the definition.

b. Show that n2 + 4n + 17 is Ω(n2) by providing appropriatevalues of c and n0 and showing how it fits the definition.

c. Show that n2 + 4n + 17 is θ(n2) by providing appropriatevalues of c1, c2, and n0, and showing how it fits thedefinition.

d. Show that n2+4n+17 is not Ω(n3) by showing that no c or n0exists that will work. Free tip: Showing that it won’t work on aspecific c is not the right approach


Expert Answer


Answer to a. Show that n2 + 4n + 17 is O(n2) by providing appropriate values of c and n0 and showing how it fits the definition. b...

(Solved) : Suppose Following B Tree K 2 Maximum Number Keys Node 3 Keys Single Characters Show Tree Q38844475 . . .

a. Suppose I have the following B-Tree with K=2 (so the maximumnumber of keys in a node is 3), with keys as single characters:Show the tree that results from inserting a “P” into tree  DHL А ВС EF G I JK M N O

b. Suppose I had inserted the numbers 1-7 into a Fibonacci Heap.Recall that insert just adds each node to the rootlist at the toplevel, so I’d have just a linked list of the numbers 1-7: Recallthat in doing the extract-min operation, we consolidate the heap.Show the result of the Fibonacci heap after extracting the min andconsolidation. You may want to show intermediate steps as well- themore you show of how the algorithm works, the more partial credit Ican give you if something goes wrong.

adds each node to the rootlist at the top level, sc numbers 1-7: Min 4 7 1 2 3 5 6 that in doing the extract-min operation, w

DHL А ВС EF G I JK M N O adds each node to the rootlist at the top level, sc numbers 1-7: Min 4 7 1 2 3 5 6 that in doing the extract-min operation, we consolidate th Show transcribed image text DHL А ВС EF G I JK M N O
adds each node to the rootlist at the top level, sc numbers 1-7: Min 4 7 1 2 3 5 6 that in doing the extract-min operation, we consolidate th

Expert Answer


Answer to a. Suppose I have the following B-Tree with K=2 (so the maximum number of keys in a node is 3), with keys as single char...

(Solved) : Create Single Dimension Array Getting Array Elements Array Size User B Find Number Whethe Q38832490 . . .


a. Create a single dimension array getting array elements and array size from user. b. Find each number whether it is prime na. Create a single dimension array getting array elements and array size from user. b. Find each number whether it is prime number or not. c. Create a second array storing only prime numbers found from (b) above. d. Show this array on output window Show transcribed image text a. Create a single dimension array getting array elements and array size from user. b. Find each number whether it is prime number or not. c. Create a second array storing only prime numbers found from (b) above. d. Show this array on output window

Expert Answer


Answer to a. Create a single dimension array getting array elements and array size from user. b. Find each number whether it is pr...

Scroll to top