Explain complex instruction set computer, Computer Engineering

CISC (Complex Instruction Set Computer)

CISC stands for Complex Instruction Set Computer. If the control unit having a number of micro-electronic circuitry to make a set of control signals and each micro-circuitry is activated by a micro-code, this design approach is known as CISC design.

 

Posted Date: 7/27/2013 1:29:19 AM | Location : United States







Related Discussions:- Explain complex instruction set computer, Assignment Help, Ask Question on Explain complex instruction set computer, Get Answer, Expert's Help, Explain complex instruction set computer Discussions

Write discussion on Explain complex instruction set computer
Your posts are moderated
Related Questions
Distinguish between enhancement mode and depletion mode metal oxide semiconductor field effect transistors giving their characteristics. Ans. Enhancement mode and depleti

The extra key inserted at the end of the array is called a Sentinel is the extra key inserted at the end of the array

An eight stage ripple counter uses a flip-flop with propagation delay of 75 nanoseconds.  The pulse width of the strobe is 50ns.  The frequency of the input signal which can be use

Q. What is Unordered Lists? First, we will build an unordered list. Many times, these lists are also termed as bulleted lists. These lists are characterized by list items which

Proving ( or disproving) mathematical theorems are an intensive intellectual task. This is because it requires deductions from hypotheses and also involves judgment. This judgm

A) Execute a program where an ellipse follows the perimeter of the window. B)  Execute a program that can draw graphs, possibly following your plan from last week. Have it graph

Three dissimilar types of convergences are: 1.  The convergence of e-commerce and wireless technology  2.  The Convergence of E-Commerce and IP Business-Grade Messaging 3

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Think about call of two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer:    The function call NUMBER_OF_PROCESORS () will return 32.

What is the difference between the C#.NET and VB.NET? VB.NET - It didn't have the XML Documentation. - It didn't have the Operator Overloading. - It didn't have the P