Maintain an absolute address in the instruction register

Assignment Help Basic Computer Science
Reference no: EM131212060

During the course of execution of a program, the processor will increment the contents of the instruction register (program counter) by one word after each instruction fetch, but will alter the contents of that register if it encounters a branch or call instruction that causes execution to continue elsewhere in the program. Now consider Figure 7.8. There are two alternatives with respect to instruction addresses:

• Maintain a relative address in the instruction register and do the dynamic address translation using the instruction register as input. When a successful branch or call is encountered, the relative address generated by that branch or call is loaded into the instruction register.

• Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register.
Which approach is preferable?

148_fd5a7552-75f5-4ff1-b68b-5f1f14be84f7.png

Reference no: EM131212060

Questions Cloud

Could this sequence be used to establish a buddy system : What would be the advantage of this system over the binary buddy system described in this chapter?
Select agent of socialization and describe a specific norm : Select one agent of socialization and describe a specific norm.- , Discuss how the norm might influence a particular social role.
Perform common operations : 1) MATLAB has several types of built-in math functions that can help you perform common operations. a) Write the MATLAB code that takes the absolute value of -134.
Maintain an absolute address in the instruction register : Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register.Which approach is preferable?
Recognized in the consolidated income statement : Houston Corporation operates a branch operation in a foreign country. Although this branch deals in pesos, the U.S. dollar is viewed as its functional currency. Thus, a remeasurement is necessary to produce financial information for external reportin..
What is symmetric cryptosystems : What is Symmetric Cryptosystems and Asymmetric Cryptosystems?
Question-shell programming : You have created the directory structure and some base files to be used by the Web server and Web site. For the Web site to be created in a production environment, you need to package your commands in a script so that the patching team can run the..
Explain what did you learn from the interview : What did you learn from the interview? How did the interviewee and/or the interview help you gain a deeper understanding of your topic? Other findings?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify potential business environments

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.

  Write a unit test of minmax in a main function

Write a function that computes the minimum and maximum of two integer variables and returns them through call-by-refernce parameters. It should have the following prototype: int minmax(int a, int b, int * min, int * max); Write a unit test of minm..

  Program the uses typedef-enumerated types

Write a C++ program the uses typedef, enumerated types, structures, and structure pointers where appropriate. Make sure the function String_To_MDY() assumes that the user correctly enters the date in the form mm/dd/yyyy.

  Problem regarding the particular gpo settings

What is the setting on an individual GPO link which forces the particular GPO's settings to flow down through the AD DS hierarchy, without being blocked by child OUs?

  Implement the database design in database management system

Describe the approach that you would take to go from a conceptual or logical model that you created in Visio to the implementation of that database structure in MySQL. Determine the additional information that you will need to implement the databa..

  Importance of clarity and conciseness

The Importance of Clarity and Conciseness (Module Six)As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some olderdirectives that were never carried out, mostly..

  Which is the best policy while driving

What kind of agent design is necessary to carry out the policy (reflex, model-based, goal-based, or utility-based)?

  Defined contribution pension plans gaining

Respond to the following question in this week's discussion board: The Response to the questions must be a least 500 work each question

  Give a 3nf decomposition of r based on the canonical cover

Give a 3NF decomposition of r based on the canonical cover.

  ?x the size of the longest word

1. Why is it important to assume that integers in our computer model have a  ?xed size? 2. Consider the word puzzle problem on page 2. Suppose we ?x the size of the longest word to be 10 characters.

  Illegal acts regarding computer networks and information

In general, forensics is the use of scientific techniques and technology in establishing the facts of criminal and civil legal matters. Computer forensics is the logical extension of this practice applied to illegal acts regarding computer networks a..

  Why is it unethical to share copyrighted files

Why is it unethical to share copyrighted files with your friends? Which of the following can be used to select the entire document?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd