Storing a word in memory - computer architecture, Computer Engineering

Storing a word in Memory:

That is similar process with fetching a word from memory.

  • The required address is loaded into the MAR
  • After that data to be written are loaded into MDR, and a write command is issued.
  • If we suppose that the data word to be stored in the memory is in R2 and that the memory address is in R1, the Write operation needed the following sequence:
  • MAR - [R1]
  • MDR -[R2]
  • Write
  • Wait for the MFC

Move R2, (R1) requires the following sequence (signal):

R1out, MARin

R2out, MDRin. Write



Posted Date: 10/13/2012 6:45:29 AM | Location : United States

Related Discussions:- Storing a word in memory - computer architecture, Assignment Help, Ask Question on Storing a word in memory - computer architecture, Get Answer, Expert's Help, Storing a word in memory - computer architecture Discussions

Write discussion on Storing a word in memory - computer architecture
Your posts are moderated
Related Questions
Q. Total number of registers in a CPU? Factors to consider when choosing total number of registers in a CPU are:  CPU can access registers faster than it can access m

What are the different methods of passing data? There are three different methods of passing data Calling by reference    Calling by value Calling by value and result

The major task of a computer is to carry out instruction execution. The key questions that can be asked in this respect are: (a) how are the instructions provided to computer? And

Canonical Genetic Algorithm: In such a scenario with all search techniques there one of the first questions to ask along with GAs is how to define a search space that is actua

The idea of clustering is defined as use of multiple computers naturally multiple storage devices, PCs or UNIX workstations and their interconnections to make what emerges to users

Define Cloud Computing with example. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., se

Develop a regular expression for Real number with optional fraction and Identifier. (i) A regular expression for real number with optional fraction is [+ | -] (d) +. (d)* (i

Secret-key encryption is also called as Private encryption.

Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes? No. The Minimal spanning tree makes sure that the total weight of the tree i

Explain UDP (User Datagram Protocol). UDP utilizes a connectionless communication paradigm. It is an application of using UDP doesn't require preestablishing a connection befor