Cisc approach - cisc architecture, Computer Engineering

CISC Approach - CISC architecture:

The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardware that is able to understand and execute a series of operations. For this specific task, a CISC processor would come prepared with a individual instruction (we'll call it "MULT"). When this instruction is executed, it loads the two values into distant registers, multiplies the operands in the execution unit, and then holds the product in the proper register. Thus, the all task of multiplying two numbers can be completed with only one instruction:

                                                         MULT 2:3, 5:2

MULT which is known as a "complex instruction." It directly operates on the computer's memory banks and does not need the programmer to explicitly call any loading or storing functions. It nearly resembles a command in a higher level language. For an example, if we let "a" stand for 2:3 and "b" stand for 5:2, then this command is identical to the C statement "a = a * b."

One of the main advantages of this system is that the compiler has to do very small work to translate a high- level language statement into assembly language. Because the length of the code is relatively small, very little RAM is needed to store instructions. The emphasis is put on building difficult instructions directly into the hardware.


Posted Date: 10/13/2012 3:47:00 AM | Location : United States

Related Discussions:- Cisc approach - cisc architecture, Assignment Help, Ask Question on Cisc approach - cisc architecture, Get Answer, Expert's Help, Cisc approach - cisc architecture Discussions

Write discussion on Cisc approach - cisc architecture
Your posts are moderated
Related Questions
What is C++ reference and JAVA final? Association ends must be bound at initialization and cannot be altered. C++ references can fully enforce these semantics, and the JAVA fin

What is the Scope of public/private/friend/protected/protected friend?    Scope of public/private/friend/protected/protected friend. Visual Basic/Visual C# Public/pub

It is possible to enter one or more criteria in the rows which can influence your database significantly. >="Callahan" this returns all the several records from Callahan to the

On the Moodle site just below the assignment you will find data from a slow sine sweep test conducted on a car on a "four-post" road simulator for the frequency range 0 to 20 Hz in

What is GUI status? How to create /Edit GUI status? A GUI status is a subset of the interface elements used for a certain screen. The status comprises those elements that are c

An expert system has death that is it operate effectively in a narrow domain containing difficult challenging problems. Thus the rules in an experts systems are necessarily co

How would you kill a process? The "kill" command takes the PID as one argument; this signifies which process to terminate. The PID of a process can be got using "ps" command

Explain analysis and synthesis phase of a compiler. The synthesis and analysis phases of a compiler are: Analysis Phase: In this breaks the source program in constituent

representation of the adjacency matrix and adjacency list

Your shell should accept and execute the pipe "|"  operator. This will look like the following: | The functionality of this operator is to execute command1 and send i