Auto increment mode and condition code flags, Computer Engineering

Described auto increment mode of addressing?

Ans: Effective address of the operand is the contents of a register mention in the instruction.

After finishing the accessing the operand, the contents of this particular register are automatically incremented to point to the next item in the list.

Explained condition code flags? And describe commonly used flags?

Ans: The processor must keep track of the information regarding the results of many

operations for the subsequent conditional branch instructions. It is done by recording required information in individual bits which is called condition code flags.

Four commonly used flags are:

  •   Z(Zero)
  •   N( Negative )
  •   C(Carry)
  •   V(overflow)


Posted Date: 10/13/2012 8:04:21 AM | Location : United States

Related Discussions:- Auto increment mode and condition code flags, Assignment Help, Ask Question on Auto increment mode and condition code flags, Get Answer, Expert's Help, Auto increment mode and condition code flags Discussions

Write discussion on Auto increment mode and condition code flags
Your posts are moderated
Related Questions
Give example of stack using encapsulation of OOA An example of the Stack.  A Stack abstraction provides methods like pop (), push (), isEmpty(), isFull(). The Stack can be i

Q. What do you mean by Software Poll? In this scheme on occurrence of an interrupt, processor jumps to an interrupt service program or routine whose job is to poll (roll call

Explain Telephone hand set and it's working. A standard telephone set is consisted of a transmitter, electrical network and a receiver for equalization, connected circuitry to

Array Processing We have seen that for performing vector operations, the pipelining concept has been taken. There is another method for vector operations. If we have an array o

It depends on our requirement. When we are needed an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use l

Parallel Computers In India, the design and development of parallel computers in progress in the early 80?s. The Indian Government recognized the Centre for Development of Adva

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

Q. Executing a parallel algorithm? Multiple processors need synchronization with one another when executing a parallel algorithm. So task which is running on processor X may ha

Can I use a Verilog function to define the width of a multi-bit port, wire, or reg type? Width  elements  of  ports,  wire  or  reg  declarations  require  a  constant  in  bot

Dynamic address translation :  If, when executing an instruction, a CPU fetches an instruction located at a specific virtual address, or fetches data from a particular virtual