Explain each step of the machine cycle

Assignment Help Computer Engineering
Reference no: EM131420437

High-level computer languages are created to be understood by humans. As a result, the keywords and the commands of these languages are easy to understand. Machine languages are harder to understand and operate.

For this assignment, you should assume that the memory cells at addresses F0 to F9 are in the machine described here, and that it contains the hexadecimal bit patterns described in the following table:

F0

20

F1

C0

F2

30

F3

F8

F4

20

F5

00

F6

30

F7

F9

F8

FF

F9

FF

1. Explain (in detail) each step of the machine cycle. Show the contents of each of the registers and each of the memory cells after the execution of the code.

2. Compare and contrast machine and high-level languages using resources from the Internet or AIU's library. Be sure to explain why the hexadecimal and binary codes are important for programming in both languages.

Op-Code

Operand

Description

1

RXY

LOAD the register R with the bit pattern found in the memory cell whose address is XY

2

RXY

LOAD the register R with the bit XY

3

RXY

STORE the bit pattern found in register R in the memory cell whose address is XY

4

0RS

MOVE the bit pattern found in register R to register S

5

RST

ADD the bit patterns in registers S and T as though they were two's complement representations and leave the result in register R

6

RST

ADD the bit patterns in registers S and T as though they represented values in floating-point notation and leave the result in register R

7

RST

OR the bit pattern in registers S and T and place the result in register R

8

RST

AND the bit patterns in register S and T and place the result in register R

9

RST

Exclusive OR the bit patterns in registers S and T and place the result in register R

A

R0X

ROTATE the bit pattern in register R one bit to the right X times. Each time place the bit that started at the low-order end at the high-order end.

B

RXY

JUMP to the instruction located in the memory cell at address XY if the bit pattern in register R is equal to the bit pattern in register number 0. Otherwise, continue with the normal sequence of execution.

C

000

HALT execution

Reference no: EM131420437

Questions Cloud

How might servant leader gender influence : How can leaders “learn ways to curtail their influence and shift problem solving back to the people involved”? How much of an influence do you think changing family structures have had on the way we think about leadership today? what would it mean fo..
How did affected employees react to the outsource process : As your textbook indicated, business process outsourcing has become an emerging trend in most small- and large-size corporations. Identify some companies with which you have been personally associated, or companies that you have read about which have..
Describe and critically evaluate the role and relevance : Describe and critically evaluate the role and relevance of [analytical investigation] to the solution of business information problems and Explain the concepts that underpin the subject area of [data mining] making reference to main established co..
The context of pay level policies such as market lead : Explain market pay line. How is it used in the context of pay level policies such as market lead, market lag, and market match? Would you rather have "you" as your colleague, manager/supervisor, or employee? Explain.
Explain each step of the machine cycle : Explain (in detail) each step of the machine cycle. Show the contents of each of the registers and each of the memory cells after the execution of the code
Important things to consider regarding your appearance : In your own words, discuss the impact that your appearance and voice have on relationships. What are the important things to consider regarding your appearance? What key areas of your voice quality should you work on as part of your personal and prof..
Determine the flow stress at this new length : Determine the flow stress at this new length and the average flow stress that the metal has been subjected to during deformation.
Explain the term intersectionality : 1. What is the main theme of Sojurner Truth's speech Ain't I a Woman and how does it explain the term intersectionality? 2. What is enlightened sexism and how does is help to (re)create negative portrayals of women in the media?
Determine the flow stress at this compressed length : Determine the flow stress at this compressed length and the aver-age flow stress that the metal has experienced during deformation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd