What are the logic micro-operations, Computer Engineering

Assignment Help:

Q. What are the Logic Micro-operations?

Logic operations are fundamentally binary operations that are performed on string of bits stored in the registers. For a logic micro-operation every bit of a register is treated as a variable.

A logic micro-operation:

R1 ← R1.R2 specifies AND operation to be performed on contents of R1 and R2 in addition store the results in R1. For illustration if R1 and R2 are 8 bits registers and:

R1 comprise 10010011 and

R2 comprise 01010101

    Then R1 will comprise 00010001 after AND operation.

Some of the common logic micro-operations are AND, OR, NOT or Complement, Exclusive OR, NOR and NAND. In many computers only four: AND, OR, XOR (exclusive OR) and complement micro-operations are implemented.

Let's now discuss how these four micro-operations can be employed in implementing some of significant applications of manipulation of bits of a word like changing some bit values or deleting a group of bits. We are presuming that resultof logic micro-operations go back to Register R1 and R2 comprises the second operand.

We will play a trick with manipulations we are performing. Let's select 1010 as 4 bit data for register R1 and 1100 data for register R2. Why? Since if you see bit combinations of R2 and R1 they represent the truth table entries (read from right to left and bottom to top)  00, 01, 10 and 11. So resultant of logical operation on them will signify which logic micro-operation is required to be performed for that data manipulation. The below table gives details on some of these operations:

R1                                                                    1          0          1          0

R2                                                                    1          1          0          0

2130_What are the Logic Micro-operations.png


Related Discussions:- What are the logic micro-operations

Example on passing parameters through stack, Q. Example on Passing Paramete...

Q. Example on Passing Parameters through Stack? PROGRAM: Version 3 DATA_SEG               SEGMENT                         BCD DB 25h; Storage for BCD test value BIN

Set up to use parallel virtual machine, Q. Set up to Use parallel virtual m...

Q. Set up to Use parallel virtual machine? PVM employs two environment variables when starting and running. Each and every PVM user needs to set these two variables to employ P

How do you save data in bdc tables, How do you save data in BDC tables? ...

How do you save data in BDC tables? The data in BDC tables is saved by using the field name 'BDC_OKCODE' and field value of '/11'.

What are types of firewalls, What are types of firewalls? There are con...

What are types of firewalls? There are conceptually two types of firewalls as: 1. Network Level 2. Application Level

Give explanation of user datagram protocol, Explain UDP (User Datagram Prot...

Explain UDP (User Datagram Protocol). UDP utilizes a connectionless communication paradigm. It is an application of using UDP doesn't require preestablishing a connection befor

How client and server use same protocol port at same time, Can both client ...

Can both client and server use the same protocol port on the same computer at the same time? Explain. Client and server can't use similar port number on similar computer at ide

Advantages of e-commerce, One of the resources we used was Ajeet Khurana's ...

One of the resources we used was Ajeet Khurana's article that talks about the advantages of e-commerce. It was helpful to gain some background on the variety of benefits the electr

Authentication verses firewall, How does an authentication system be differ...

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

What is exact and approximation algorithm, What is Exact and Approximation ...

What is Exact and Approximation algorithm? The principal decision to choose solving the problem exactly is called exact algorithm. The   principal decision to choose solving th

What are the important tools of a three-tier client server, What are the im...

What are the important tools of a three-tier client server? In a three-tier or multi-tier environment, there the client implements the presentation logic or the client. The bus

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd