Control hazard and delayed branching, Computer Engineering

Described Instruction or control hazard?

Ans: The pipeline can be stalled due to delay in the availability of an instruction. For instance, this may be a result of a miss in the cache, needing the instruction to be fetched from the primary memory. Such hazards are frequently called control hazards or instruction hazard.

Explained delayed branching?

Ans: Delayed branching which is used to minimize the penalty incurred as a result of conditional branch instruction. The following location of the branch instruction is known as delay slot. The instructions in the delay slots are always fetched and they are set such that they are fully executed whether branch is taken or not. That is branching takes place 1 instruction afterwards than where the branch instruction seem in the instruction sequence in the memory therefore the name delayed branching.

 

Posted Date: 10/13/2012 8:25:26 AM | Location : United States







Related Discussions:- Control hazard and delayed branching, Assignment Help, Ask Question on Control hazard and delayed branching, Get Answer, Expert's Help, Control hazard and delayed branching Discussions

Write discussion on Control hazard and delayed branching
Your posts are moderated
Related Questions
State the criteria which a trusted publisher should meet before adding him? Ans) The following criteria should be met by the publisher before adding him to the list. ? The

Q. Era of first generation computers? The trends that were encountered at the time of the era of first generation computers were: Centralized control in a single CPU (al

Differentiate between protection and security. Operating system contains a collection of objects, software or hardware. All objects have a unique name and can be accessed by

Design a counter modulo 4 (sequential circuit with two flip-flops and one input U) which work like that: 1. When U=0, the state of the flip-flop does not change. 2. Whe

What are the standard types of files produced? A PDF file is universally recognized by the internet and is also a secure image, given that an electronic footprint remains when

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Q. What is Metropolitan Area Network? Metropolitan Area Network (MAN):  It is privately or public owned communication system that naturally covers a complete city. Speed is abo

Q. Execute a reduce operation over members of specified group? int info = pvm_reduce( void (*func)(), void *data, int count, int datatype, int msgtag, char    *group, int root

How will you form an 8 bit adder using 2 four bit adder IC's 7483? Ans: 4 bit adder IC is IC 7483. This has two four bit data inputs and output carry, 4 bit data output carr

Differentiate between validation and exception testing. - Validation testing is done to test software in conformance to requirements specified. It aims to demonstrate that soft