what is Decode or execution cycle?, Basic Computer Science

just the once the instruction has been fetched and is accumulated, the next step is to decode the instruction so as to work out what actions should be performed to execute it. This occupies examining the opcode to observe which of the machine codes in the CPU’s instruction set it communicates to, and also verifying which addressing mode needs to be used to get any required data.
Once the opcode is known, the execution cycle can take place. Different actions require to be carried out dependant on the opcode, without two opcodes requiring the same actions to occur. Though, there are usually four groups of different actions that can occur:
• Move of data between the CPU and memory.
• move of data between the CPU and an input or output devices.
• Processing of data, perhaps involving the use of the arithmetic and logic unit.
• A control operation, with the intention of change the sequence of subsequent operations. These can probably be conditional, based on the values stored at that point within the flag register.
For greater ease, and as describing all the possible instructions:
Mnemonic Description
MOV Moves a data value from one location to another
ADD Adds to data values using the ALU, and returns the result to the accumulator
STO Stores the contents of the accumulator in the specified location
END Marks the end of the program in memory
Posted Date: 5/3/2012 8:16:26 AM | Location : United States







Related Discussions:- what is Decode or execution cycle?, Assignment Help, Ask Question on what is Decode or execution cycle?, Get Answer, Expert's Help, what is Decode or execution cycle? Discussions

Write discussion on what is Decode or execution cycle?
Your posts are moderated
Related Questions
Execution of a machine instruction: Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cyc

Question 1 Write a note on modems Question 2 What are the Safe Chatting Rules Question 3 Explain three basic kinds of hypertext links Question 4 Write a no

Question 1 What is role playing game? Explain the special design issues for sports games Question 2 What do you mean by collusion? Explain its types Question 3 Wri

Input a list of positive numbers, terminated by 0, into an array numbers []. Then display the array and the largest and smallest number in it.

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

mention the aims of education in present scenario

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

Problem: (a) Using appropriate examples describe what are System software and Application Software. (b) Explain four tasks of file management a user frequently performs i

Magnetic Memory:  In the above section we have seen various types of semiconductor RAMs. These high speed semiconductor storage devices (i.e. RAMs) are expensive. So we need s

I define a restricted form of TMs M as follows. Given any input x on the tape of M, the initial portion of the tape that holds x is read-only and one-way. That is, M cannot write o