two fetch-execute cycles, Software Engineering

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]

Posted Date: 3/11/2013 2:39:32 AM | Location : United States







Related Discussions:- two fetch-execute cycles, Assignment Help, Ask Question on two fetch-execute cycles, Get Answer, Expert's Help, two fetch-execute cycles Discussions

Write discussion on two fetch-execute cycles
Your posts are moderated
Related Questions
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What is meant by Data dictionary? The Data dictionary is a prepared listing of all data elements that are pertinent to the system, with precise, rigorous explanations so that b

Q. Illustrate the Features of function count? Features:- Function point goes forward is independent of the language tools or methodologies used for implementation.

Differentiate between smoke testing and sanity testing. -Smoke testing verifies all areas of application; sanity testing recognizes one or few areas only. -Smoke testing is

What is Operational Requirements? Ans) Qualitative and quantitative parameters that states the desired operational capabilities of a system and serve as a basis for determining

When do you choose automated testing over manual testing? Automation is chosen when -A similar set of tests need to be repeated again and again -When a single test requi

What is Requirements Definition Description Output of requirements of engineering process is Requirements Definition Description (RDD). Requirements engineering can be defined

What is a boundary value analysis? A boundary value analysis is a testing method in which the elements at the edge of the domain are selected and tested. It is a test case desi

Question 1: (a) A company wishes to under-go a Business Process Re-engineering activity with respect to its core business processes. Explain the extent to which MIS could be

What are the various testing strategies for conventional software? i. Unit testing ii. Validation testing. iii. Integration testing. iv. System testing.