pipelining concept, Basic Computer Science

The easiest way to approach pipelining is to regard as the three stage fetch, decode and execute instruction execution cycle outlined earlier. There are times during each of these sub cycles of the main cycle where the main memory is not being accessed, and the CPU could be regarded as ''idle''. The idea, hence, is to begin the fetch stage for a second instruction while the first stage is being decoded. When first instruction one is being executed and second instruction is being decoded, a third instruction can be fetched.
Posted Date: 5/3/2012 8:44:17 AM | Location : United States







Related Discussions:- pipelining concept, Assignment Help, Ask Question on pipelining concept, Get Answer, Expert's Help, pipelining concept Discussions

Write discussion on pipelining concept
Your posts are moderated
Related Questions

what is cpu

Question 1 Bring out the advantages of Linux Operating systems Question 2 Match the Symbols with their respective file types              Symbol               File N

Create Email Account: For sending or receiving email, you need to have to an email account. The email account may be provided by the organization for which you are working or

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Define Levels of Abstraction in a DBMS, explain briefly, Conceptual Schema, Physical Schema, External Schema

Magnetic Memory:  In the above section we have seen various types of semiconductor RAMs. These high speed semiconductor storage devices (i.e. RAMs) are expensive. So we need s

Question 1 Explain the importance of graphics in multimedia. What are few of the tips to keep in mind while using graphics for the web? Question 2 Write a long note on co

4. Provide a list of productid’s, the name of the vendor and their credit rating. The results should be ordered by last name and then by credit rating. Write out the SQL that wo

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac