two fetch-execute cycles, Software Engineering

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]

Posted Date: 3/11/2013 2:39:32 AM | Location : United States







Related Discussions:- two fetch-execute cycles, Assignment Help, Ask Question on two fetch-execute cycles, Get Answer, Expert's Help, two fetch-execute cycles Discussions

Write discussion on two fetch-execute cycles
Your posts are moderated
Related Questions
Define about the Integration testing - This test is performed to verify interfaces between system components, interactions between application and file system, hardware and ot


INFORMATION STORAGE  AND RETRIEVAL SOFTWARE: IBM (International Business Machines Corporation) was one of the earliest to invest money to develop software packages intended fo

A document reporting on any event that happens during testing that needs further investigation.

A friend has promised to log in at a particular time. However, he needs to be contacted as soon as he logs in. The shell script checks after every minute whether he has logged in o

Give explanation about the software testing strategies. A strategic approach to software testing. Verification and Validation. Verification means a set of work o

Q. What do you understand by Software Crisis? Ans) Organizations are spending much larger portions of their budget on software. Not only are the software turning out to be more

Q. Define graph matrix and connection matrix. Ans: Graph matrix: A graph matrix is a square matrix whose size that is a number of rows and columns is equal to the number of n

QUESTION - Name Services (a) Illustrate with help of a diagram the results of a DNS lookup and an ARP lookup assuming we are using IPv4. (b) Why do DNS root servers hold en

Explain Smoke testing - Smoke testing covers all of the fundamental functionality of application. - It is considered as the main test for checking the functionality of appli