How many bits are needed for the opcode

Assignment Help Computer Engineering
Reference no: EM131212171

Assignment - MARIE & ISA

Task-

Q1. A digital computer has a memory unit with 16 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.

a) How many bits are needed for the opcode?

b) How many bits are left for the address part of the instruction?

c) What is the maximum allowable size for memory?

d) What is the largest unsigned binary number that can be accommodated in one word of memory?

Q2. Consider the MARIE program below.

a) List the hexadecimal code for each instruction.

b) Draw the symbol table.

c) What is the value stored in the AC when the program terminates?

Hex

Addr Label          Instruction

100 Start,             Load A

101                         Add B

102                         Store Temp

103                         Load C

104                         Add D

105                         Add Temp

106                         Store F

107                         Output

108                         HALT

109    A,                 DEC 5

10A    B,                DEC 3

10B     C,                DEC 4

10C     D,               DEC 13

10D     E,                DEC 3

10E   Temp,      HEX 00FD

10F     F,                HEX 00FE

Q3. Write code to implement the expression

F = (A+B) /(C*D*E) on 2-, 1- and 0-address machines.

Reference no: EM131212171

Questions Cloud

Develop the function qwerty : Exercise 5 Develop the function qwerty. The function consumes a counting number and extracts that many keyboard characters from the string "qwerty".
Develop a java application that inputs the salesperson : Develop a Java application that inputs the salesperson's gross sales for that item for last week and calculates and displays that salesperson's earnings. There is no limit to the number of items sold. After the loop is done, print out the aggregat..
Alexander falconbridge an account of the slave trade : What does Falconbridge's account of the slave trade and the middle passage tell us about the nature of the Atlantic Slave trade?
What are the purpose of change management : Question 1: What are the purpose of change management? Question 2: What is a relationship between changeq Incidentq Service Request q Release Question 3: What are the Fiverisk indicators of poor change management ?
How many bits are needed for the opcode : A digital computer has a memory unit with 16 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). How many bits are need..
How many of these one million pairs will hash to the bucket : If we hash each field to a large number of buckets, as suggested by Example 22.9, how many of these one million pairs will hash to the same bucket for at least one of the three hashings?
Picture of systems analysis and systems development : How does the Internet, and more specifically the World Wide Web, fit into the picture of systems analysis and systems development?
The histories the second persian invasion of greece : Read given file, Herodotus, The Histories, The Second Persian Invasion of Greece. - And discuss should contain a thesis statement, evidence from the texts to support argument.
Identify the economic environment : Using your chosen company's domestic and global environments identify the economic environment of each and compare and contrast it using Rostow and Galbraith (see lesson plan and resources below).

Reviews

len1212171

9/19/2016 5:15:54 AM

This assessment task covers topics on CPU operation and Instruction Set Architecture, and has been designed to make sure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to define and appropriately use computer systems terminologies; describe the essential elements of computer organisation and discuss how the elements function; describe the basic instruction set architecture of a simple computer; discuss the general trends in computing technologies including examples of leading edge developments.

Write a Review

Computer Engineering Questions & Answers

  Express how the program is to work

Write a GUI program which incorporates a try-catch block to error check the input for integers and alphabetic characters other than Y or N. Your program must include.

  Concept of inheritance and object hierarchy

Study the concept of inheritance and object hierarchy in the object-oriented programming.

  What is the memory operations dominate execution time

What is  the memory operations dominate execution time

  Suppose we have a network of nodes

suppose we have a network of nodes connected via point to point links, and a source S sends a message that will be broadcast to all nodes using Reverse-Path-Flooding. Assume that routers do not keep track of broadcast messages they have seen earli..

  Evaluate some simple semantic web application

Comparative evaluation of alternative AI-based machine learning approaches on a broad range of classification tasks.

  Write a program that creates a weighted graph and outputs

Write a program that creates a weighted graph and outputs the shortest distance from a given node to every other node in the graph.

  What would be the average disk access time

Are the people who are against adding RAID to the system correct in their assertion that 50% slower disks will result in revenues declining to $5,000 per hour?

  Briefly explain some of the issues that a company may face

information systems use security policy write a paper consisting of 500-1000 words double spaced about your experience

  Program to determine persons body mass index

Develop a program which determines a person's body mass index. Develop the modular program which determine and display a person's body mass index (BMI).

  Application showing files name-size and last modifiaction

Make a file by utilizing any word-processing program or the text editor. Write down an application which shows the file's name, size, and time of the last modification.

  Complete the given host defenses matrix

Complete the below Host Defenses matrix by discussing the various attacks and defenses of the company in each of the rows as they relate to a security advisory that your learning team will present to the management group of XYZ Company.

  Why should you consider storage formats that already exist

Why should you consider the storage formats that already exist in an organization when deciding on a storage format for a new system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd