Cisc approach - cisc architecture, Computer Engineering

CISC Approach - CISC architecture:

The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardware that is able to understand and execute a series of operations. For this specific task, a CISC processor would come prepared with a individual instruction (we'll call it "MULT"). When this instruction is executed, it loads the two values into distant registers, multiplies the operands in the execution unit, and then holds the product in the proper register. Thus, the all task of multiplying two numbers can be completed with only one instruction:

                                                         MULT 2:3, 5:2

MULT which is known as a "complex instruction." It directly operates on the computer's memory banks and does not need the programmer to explicitly call any loading or storing functions. It nearly resembles a command in a higher level language. For an example, if we let "a" stand for 2:3 and "b" stand for 5:2, then this command is identical to the C statement "a = a * b."

One of the main advantages of this system is that the compiler has to do very small work to translate a high- level language statement into assembly language. Because the length of the code is relatively small, very little RAM is needed to store instructions. The emphasis is put on building difficult instructions directly into the hardware.

 

Posted Date: 10/13/2012 3:47:00 AM | Location : United States







Related Discussions:- Cisc approach - cisc architecture, Assignment Help, Ask Question on Cisc approach - cisc architecture, Get Answer, Expert's Help, Cisc approach - cisc architecture Discussions

Write discussion on Cisc approach - cisc architecture
Your posts are moderated
Related Questions
Explain about CSMA/CD It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other  statio

Q. Binary floating-point number range? Smallest Negative number   Maximum mantissa and maximum exponent     =    - (1 -2 -24 ) × 2 127   Largest negative number

Convert the decimal number 430 to Excess-3 code ? Ans. Excess  3  is  a  digital  code  acquired  from  adding  3  to  every  decimal  digit  and  after that converting the res

Make a console application with a class 'Account' having variables as id(int) and name (String).Add property 'account-no' which can be set andget. Add a 'ReadOnly' property 'IntRat

Building the Structure Chart - Processes in the DFD tend to show single module on the structure chart Afferent processes - give inputs to system Central processes -

In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: the switching elements Given: N =M =512,

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are send

representation of the adjacency matrix and adjacency list

Q. Write a program to implement NOR, NAND, XOR and XNOR gates using and without using bit wise operator. Also perform necessary checking. The user has option to give n numbe

Why we need to construct state transition diagram Basically you need to construct a state transition diagram for each object with important behaviour. You need not construct on