Explain complex instruction set computer, Computer Engineering

CISC (Complex Instruction Set Computer)

CISC stands for Complex Instruction Set Computer. If the control unit having a number of micro-electronic circuitry to make a set of control signals and each micro-circuitry is activated by a micro-code, this design approach is known as CISC design.

 

Posted Date: 7/27/2013 1:29:19 AM | Location : United States







Related Discussions:- Explain complex instruction set computer, Assignment Help, Ask Question on Explain complex instruction set computer, Get Answer, Expert's Help, Explain complex instruction set computer Discussions

Write discussion on Explain complex instruction set computer
Your posts are moderated
Related Questions

Design a 8 to 1 multiplexer by using the fourvariable function given by F(A, B, C, D) = ∑ m(0,1,3,4,8,9,15). Ans. Design of 8 to 1 Multiplexer: It is a four-variable function a

Forward Chaining: Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal

What is Orientation-  object-oriented technology There are many characteristics of object-oriented technology. A few of these characteristics have been discussed in cour

a c program to implement multiple stack in a single array

"George has a dog called Ernie, which is a trained Labrador. Trained Labradors and poodles are obedient, and all obedient dogs are good dogs. All good dogs that have a master will

Write a decision table that specifies the rules for the game of checkers

Q. Convert the following from hexadecimal to binary, decimal, BCD and octal. a) 111 b) ABC.25 c) 2.C Q. Convert the following from BCD to binary, decimal, hexadecimal an

How many address bits are required to represent 4K memory ? Ans. 12 address bits are required for representing 4K memory, as 4K = 2 2 x 2 10   = 2 12 Therefore 1K = 1024

Q. Illustrate Associative Memory? The time required to find an item which is stored in memory can be decreased significantly if stored data can be identified for access by cont