Explain about data registers, Computer Engineering

Assignment Help:

Q. Explain about data registers?

The data registers are used just for storing intermediate results or data and not for operand address calculation.

Some dedicated address registers are:

Segment Pointer :  Employed to point out a segment of memory.

Index Register :  These are used for index addressing scheme.

Stack Pointer: Points to top of stack when programmer visible stack addressing is used.

One of fundamental issues with register design is number of general-purpose registers or data and address registers to be provided in a microprocessor. Number of registers also affects instruction design as number of registers concludes the number of bits required in an instruction to specify a register reference. In common it has been found that optimum number of registers in a CPU is in range 16 to 32. In case registers fall below range then more memory reference per instruction on an average will be required as some of intermediate results then have to be stored in memory. Instead if the number of registers goes above 32 then there is no appreciable reduction in memory references. Though in a number of computers hundreds of registers are used. These systems have special features. These are known as Reduced Instruction Set Computers (RISC) and they exhibit this property.


Related Discussions:- Explain about data registers

DoDAF OV-2 for a green datacenter, How do I create a DoDAF OV-2 for the con...

How do I create a DoDAF OV-2 for the construction of a green data center?

Find the complement of following functions, Q. Find the complement of follo...

Q. Find the complement of following functions and reduce to minimum literals 1. (A+C+D) (A+C+D') (A+C'+D)(A+D') 2. ABC(ABC' + AB'C + A'BC) 3. AB + AB' + A'C +A'C'

Over fitting considerations, Over fitting Considerations : Hence in le...

Over fitting Considerations : Hence in left unchecked there backpropagation in multi-layer networks can be highly susceptible to overfitting itself to the training examples. B

Secure systems development, Write an academic report on a significant softw...

Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example: The nature of the software vuln

Explain the test instruction, Explain the TEST instruction TEST instru...

Explain the TEST instruction TEST instruction performs the AND operation. The difference is that AND instruction changes the destination operand whereas TEST instruction doesn

Explain about butterfly permutation, Q. Explain about Butterfly permutation...

Q. Explain about Butterfly permutation? Butterfly permutation:  This kind of permutation is attained by interchanging the most significant bit in address with least significant

Subsequent statements set every element of matrix, Q. Subsequent statements...

Q. Subsequent statements set every element of matrix? Let a= [2,4,6,8,10], b=[1,3,5,7,9], c=[0,0,0,0,0] Consider the subsequent program section FORALL (i = 2:4)   a(i)

What is the purpose of zero (z) flag and carry (c) flag, What is the purpos...

What is the purpose of zero (z) flag and carry (c) flag? Carry flag holds the carry after addition or the borrow after subtraction. Carry flag also indicates error conditions,

Operating sustem, describe the action by thread library to context switch ...

describe the action by thread library to context switch between user level threads

Explain the operation of JK flip flop when all inputs are 0, Write the trut...

Write the truth table for a clocked J-K flip-flop that is triggered by the positive-going edge of the clock signal. Explain the operation of this flip-flop for the following condit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd