Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Why do we need Registers?
If tcpu is cycle time of CPU which is the time taken by CPU to execute a well-defined micro-operation employing registers and tmem is memory cycle time which is the speed at which memory can be accessed by CPU then (tcpu/tmem) is in the range of 2 to 10 i.e. CPU is 2 - 10 times faster than memory. So CPU registersare the fastest temporary storage areas. So the instructions whose operands are stored in fast CPU registers can be executed fast in comparison to instructions whose operands are in main memory of a computer. Every instruction should designate the registers it will address. So a machine needs a large number of registers.
Figure: CPU with general register organisation
Q. Block diagram of an associative memory? The block diagram of an associative memory is displayed in Figure below. It comprises of a memory array and logic for m words with n
Why are interrupt masks provided in any processor? Interrupt mask enable the higher priority devices comes first and there for lower priority devices comes last. The interrupt
What are the update types possible? The following update types are possible: Update type A: The matchcode data is updated asynchronously to database changes. Update
Explain elements of language Grammer . As proposed through Noam Chomsky, a grammar G contains the following elements: a. A finite set N of non terminal symbols. b. A f
Differentiate between $display and $strobe These commands have similar syntax, and display text on screen during simulation. $display and $strobe display once every time they a
Sun and Ni's Law The Sun and Ni's Law is a generalization of Amdahl's Law as well as Gustafson's Law. The fundamental idea underlying the Sun and Ni's Law is to find the soluti
Determine about the Security methods Security methods also protect information from accidental or intentional modification, manipulation or destruction. Most security experts o
Write a short note on pointer declaration A simple variable in a program is stored in a certain number of bytes at a particular memory location, or address, in the machine. Poi
What is meant by inter process communication? Inter process Communication: The OS give the means for cooperating processes to communicate with each other through an inter pro
Memory-to-Memory Architecture : The pipelines can access vector operands, intermediate and final results directly in the main memory. This needs the higher memory bandwidth. How
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd