Cisc approach - cisc architecture, Computer Engineering

CISC Approach - CISC architecture:

The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardware that is able to understand and execute a series of operations. For this specific task, a CISC processor would come prepared with a individual instruction (we'll call it "MULT"). When this instruction is executed, it loads the two values into distant registers, multiplies the operands in the execution unit, and then holds the product in the proper register. Thus, the all task of multiplying two numbers can be completed with only one instruction:

                                                         MULT 2:3, 5:2

MULT which is known as a "complex instruction." It directly operates on the computer's memory banks and does not need the programmer to explicitly call any loading or storing functions. It nearly resembles a command in a higher level language. For an example, if we let "a" stand for 2:3 and "b" stand for 5:2, then this command is identical to the C statement "a = a * b."

One of the main advantages of this system is that the compiler has to do very small work to translate a high- level language statement into assembly language. Because the length of the code is relatively small, very little RAM is needed to store instructions. The emphasis is put on building difficult instructions directly into the hardware.

 

Posted Date: 10/13/2012 3:47:00 AM | Location : United States







Related Discussions:- Cisc approach - cisc architecture, Assignment Help, Ask Question on Cisc approach - cisc architecture, Get Answer, Expert's Help, Cisc approach - cisc architecture Discussions

Write discussion on Cisc approach - cisc architecture
Your posts are moderated
Related Questions
Microsoft in the late 1997 introduced a standard API called as OLE DB. After which XML was used for analysis specification and this specification was largely used by a lot of vendo

what is the work of pin daigram in 8086 microprocessor in assembly

It is possible to enter one or more criteria in the rows which can influence your database significantly. >="Callahan" this returns all the several records from Callahan to the

Can SMTP be used as transfer protocol for Web pages? Why? SMTP is an easy mail transfer protocol. This uses ASCII text for all communications. SMTP needs reliable delivery- the


With relevant logic diagram and truth table explain the working of a two input EX-OR gate. Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an od

Virtual memory: Virtual memory is a technique which realized an application program the idea that it has contiguous working memory (an address space), whereas in fact it may b

Solve the equation 23.6 10 = X 2 for X Ans. 23.6 10 = X 2 So as to find X, firstly convert the Decimal number 23.610 in its Binary form. After that take the decimal inte


Coding advantages of casex or casez By using casex or casez has the following coding advantages: -  It reduces number of lines, especially if the number of bits had been m