Explain difference between risc and cisc, Computer Engineering

RISC-Means Reduced Instruction Set Computer. A RISC system has decreased number of instructions and more significantly it is load store architecture were pipelining can be executed easily. Eg.ATMEL AVR.

CISC- Complex instruction set computer. A CISC system has complex instructions such as direct addition among data in two memory locations.Eg.8085.          

 

 

Posted Date: 4/6/2013 3:40:19 AM | Location : United States







Related Discussions:- Explain difference between risc and cisc, Assignment Help, Ask Question on Explain difference between risc and cisc, Get Answer, Expert's Help, Explain difference between risc and cisc Discussions

Write discussion on Explain difference between risc and cisc
Your posts are moderated
Related Questions
E-Cash:  E-cash is cash shown by two models. One is the on-line form of e-cash (introduced by DigiCash) which permits for the completion of all types of internet transactions.

What are the different parameter passing mechanisms to a function? The different parameter-passing mechanisms are given below: 1.   Call by value 2.   Call by value-resu

Opening Files for Reading Only     : A data file is a file that you can open and read its contents visually - for example, C source files, .dat files, HTML etc - anything that look

What is Process? Process: A process is a program in execution. It is an active entity, represented through the value of the program counter and the contents of registers o

Explain the term step-wise refinement. Ans:  Step Wise Refinement  Refinement is a method of elaboration. Here one starts with a statement of function that is described a

The controller responds to user interactions, with the application, by selecting the act method to implement and also selecting the view to render.

Backpropagation Learning Routine: Conversely as with perceptrons there the information in the network is stored in the weights than the learning problem comes down to the ques

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

The decimal equivalent of (1100) 2   is ? Ans. (1100) 2 = (12) 10

Q. Describe about full adder? Let's take full adder. For this other variable carry from previous bit addition is added let'us call it 'p'. Truth table and K-Map for this is dis