description of Instruction execution, Basic Computer Science

When software is installed onto a modern day personal computer (most commonly from a CD-ROM, though other media or downloading from the internet is also common), code comprising the program and any associated files is stored on the hard drive. This code comprises of a sequence of instructions for performing designated tasks, and data associated with these instructions. The code remains there until the user chooses to execute the program in question, on which point sections of the code are loaded into the computer’s memory.
The CPU then executes the program from memory, processing every instruction in turn. Certainly, in order to execute the instructions, it is necessary for the CPU to understand what the instruction is telling it to do. Consequently, recognition for instructions that could be encountered requires to be programmed into the processor. The instructions that can be recognized by a processor are referred to as an ''instruction set'',
Once the instruction has been recognized, and the actions that should be carried out are decided upon, the actions are then performed before the CPU continues on to the next instruction in memory. This process is called the ''instruction execution cycle'',
Results can then be accumulated back in the memory, and later saved to the hard drive and perhaps backed up onto removal media or in separate locations
Posted Date: 5/3/2012 7:28:04 AM | Location : United States







Related Discussions:- description of Instruction execution, Assignment Help, Ask Question on description of Instruction execution, Get Answer, Expert's Help, description of Instruction execution Discussions

Write discussion on description of Instruction execution
Your posts are moderated
Related Questions
QUESTION 1 Describe the binary search algorithm using an example of your own. QUESTION 2 (a) By showing all your workings, give a big-O estimate for f(x) = (x + 1)lo

Problem In the Excel sheet, input the marks of any 5 students with 5 subjects and find the average marks, maximum marks, minimum marks obtained by the student. Using Excel s

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

QUESTION (a) Convert each of the following expressions to prefix and postfix. (i) (A+B)*(C+D) (ii) A-B/(C*D^E) (^ denotes exponentiation) (b) The following algorithm c

When software is installed onto a modern day personal computer (most commonly from a CD-ROM, though other media or downloading from the internet is also common), code comprising th

Device Drivers:   Device drivers are shared computer programs that provide an interface between the hardware devices and operating system or other higher level programs.

Python is an interpreted, high-level, interactive and object oriented-scripting language. Python was designed to be extremely readable which uses English keywords commonly where as

Create systems flow chart and state tranistion diagram for online placement and consultancy

Liquid Crystal Displays (LCD): First introduced in watches and clocks in the1970's, LCDs are now used to display images in monitors. A newer technology in computer screens is

#formular for calculating speed up factor fo super scalar architecture, super pipeline architecture and VLIW with m different functional units.