Determine maximum size of register file in instruction-set

Assignment Help Basic Computer Science
Reference no: EM1369431

You are designing a simple 32-bit instruction-set architecture which needs to support 45 opcodes, three source operands and one destination operand. All the source and destination operands are registers. Moreover, all the operands should be able to access all the registers.

a) What is the maximum size of the register file that this architecture can use (show your computations)?

b) Suggest an implementation for this system ISA.

Reference no: EM1369431

Questions Cloud

Which of following is unique to capitalist ideology : Have no effect on equilibrium price and quantity. Reduce quantity demanded, but not shift demand curve. Which of following is unique to capitalist ideology.
Determine the new equilibrium price and quantity : After a decade long advertising war, NIK and REB are only two surviving company in the sport shoe market. The yearly demand in this market is given through P=100-0.5q.
Find out the horizontal force : How many 65W light bulbs can be connected in parallel across a potential difference of 85 V before the total current in the circuit exceeds 2.10A.
Example for capturing greater market share : A combination of low cost product along with differentiation will allow the organization to capture greater market share.
Determine maximum size of register file in instruction-set : You are designing simple 32-bit instruction-set architecture which requires to support 45 opcodes, three source operands and one destination operand. Determine the maximum size of register file that this architecture can use?
What changes in sales would you anticipate if you manager : What changes in sales would you anticipate if you were manager of a Dodge/Plymouth franchise. What is each firm's marginal revenue.
How fast is it moving when the bullet leaves : A sealed cubical container 17cm on a side contains three times Avogadro's number of molecules at a temperature of 16°C. Find out the force exerted by the gas on one of the walls of the container.
Explain the contractor agrees that he is fully informed : Explain The contractor agrees that he is fully informed regarding all the conditions affecting work to be done and labour and materials to be furnished for the completion of the contract and that his information was secured by personal investigati..
Natural disaster affects on supply and demand : Assume you are asked to do market analysis in an area in which a natural disaster has recently occurred. For example, Nashville after Spring floods or New Orleans after Hurricane Katrina.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Hardware and system software qualify as infrastructure

What is infrastructure? In what was do hardware and system software qualify as infrastructure? What basic strategic planning questions should be addressed with respect to infrastructure?

  Explaining social network widgets and resaurant locators

The popularity of Apple's iPhone and Application store has made _____ improtant to advertisers, who see social network widgets, resaurant locators.

  Good meetings in software development life cycle

Provide three words or phrases that explain why "good meetings" are important during the Software Development Life Cycle?

  What strategies implement in terms of career development

What strategies you will implement in terms of your career development. How these strategies specifically relate to your career goals and advancement.

  Explain relationship oriented and less transaction oriented

Are geared towards short-term spot purchasing. Are more relationship oriented and less transaction oriented than private industrial networks.

  Demonstrate skills in drawing tools

To begin to combine and demonstrate skills in drawing tools, tweens, working with text, and telling a story

  Explain classic five-stage risc integer pipeline

Assume that the initial value of R3 is R2 + 496. Use the classic five-stage RISC integer pipeline and assume all memory accesses take 1 clock cycle.

  Different methods that freedom of expression is limited

Describe three different methods that freedom of expression is limited in spite of unequivocal language of First Amendment.

  Finding content of top of stack-call instruction is executed

Specify the content of PC, SP, and the top of the stack in the following situations: After the call instruction is executed.

  Advantage to process the data

You can write your program to next the loops in either direction, that is, process row by row or column by column. Explain which way you would choose to process the data. What is the advantage?

  Steps to follow to verify local police department-s findings

Your computer investigation firm has been hired to verify the local police department's findings on a current case. What do you need to ask the police investigator for, and what procedures should you follow?

  Explain how risc-pipelining evolved over past years

Explain how concepts such as RISC, pipelining, cache memory, and virtual memory have evolved over the past twenty-five years to improve system performance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd