Inter suffer buffer and execute an instruction, Computer Engineering

What are the basic steps needed to execute an instruction by the processor?

Ans: The basic steps needed to execute an instruction by the processor are:

A)    First fetch the contents of the memory location pointed to by the PC. They are loaded into the IR register.

                  IR←[[PC]]

B) Supposing that the memory is byte addressable, increment the contents of the PC by

4, that is PC← [PC} + 4

c)  In last Carry out the action specified by the instruction in the IR.

Give hardware organization of two-stage pipeline?

1401_Inter suffer Buffer.png

                                                  Inter suffer Buffer

Explained the role of cache memory in pipeline?

Ans: cache memory is used to solve the memory access problem. When cache is inserted in the processor the access time to the cache is typically the same time required to perform other basic operation inside the processor.

Posted Date: 10/13/2012 8:20:58 AM | Location : United States







Related Discussions:- Inter suffer buffer and execute an instruction, Assignment Help, Ask Question on Inter suffer buffer and execute an instruction, Get Answer, Expert's Help, Inter suffer buffer and execute an instruction Discussions

Write discussion on Inter suffer buffer and execute an instruction
Your posts are moderated
Related Questions
Write a program that finds the minimum total number of shelv, C/C++ Programming

The XOR gate. The exclusive OR or XOR gate is similar to a two input OR gate. The output of an XOR gate is logic 1 only when one input or the other input is high and is 0 when

The heart of an experts systems is the powerful corups of knowledge that accumulates during system building. The knowledge is explicit and organized to simplify decisio

The subsequent step in Karnaugh map is to map truth table in the map. Mapping is done by putting a 1 in respective square belonging to 1 value in truth table. This mapped map is us

Ethernet 10 Base 2 is an example of               network topology. (A)  Bus                                           (B)  Ring (C)  Star

This comes at the complication time, If we give the LOGO option to the compiler, it take a bitmap file (i.e., ) as logo previous to loading the Application.

Define the difference between static RAM and dynamic RAM? The RAM family comprises two important memory devices that are static RAM (SRAM) and dynamic RAM (DRAM). The main diff

There are two different parts of applets. Trusted Applets and Untrusted applets. Trusted Applets are applets with predefined security and Untrusted Applets are applets without any

What is the use of hypertext links in Internet access? Use of Hypertext links in Internet access: From the user’s view point, the Web comprised a vast, worldwide collecti

what is the code to detect image forgery using Matlab..??