How many register window should be saved to memory as result

Assignment Help Basic Computer Science
Reference no: EM1356626

Suppose that a RISC machine uses 5 register windows.

a) How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?)

b) Suppose two more calls are made after the maximum value from part (a) is reached. How many register windows must be saved to memory as a result?

c) Now suppose that the most recently called procedure returns. Explain what occurs.

d) Now suppose one more procedure is called. How many register windows need to be stored in memory?

Reference no: EM1356626

Questions Cloud

Testing preschool children : Hi, please assist me with explaining two different features or aspects (behavior, appearance, communication etc...,) related to testing preschool children along with providing specific examples.
Execution of leadership duties : How watching leaders in the movie "A Few Good Men" might affect your perception or execution of your leadership duties.
Explain students have freedom to develop : Explain Students have freedom to develop and write this philosophical piece as a vision of their own practice for the future
What is the mass of water in the container : A loudspeaker of mass 20 is suspended a distance of 2 below the ceiling by two cables that make equal angles with the ceiling. Each cable has a length of 2.90.
How many register window should be saved to memory as result : Assume two more calls are made after the maximum value from part (a) is reached. How many register windows must be saved to memory as a result?
Journal entries-percentage of completion method : Record the journal entries for each year using the % of completion method. Show the partial accounts on the December 31 balance sheet for each year. Show the January 1 to Dec 31 Income statement for each year.
Coaching style and learning styles : many people have different styles in communication, teaching and coaching styles, do you think one needs to adapt ones coaching style based on who are the recipients?
Pervasive mental disorders of childhood : Autistic disorder and Asperger's disorder are among the most pervasive mental disorders of childhood.
Calculate the arithmetic mean annual rate of return : During the last five years, you owned two stocks that had the following yearly rates of return, Calculate the arithmetic mean annual rate of return for every stock.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Pipelined machine versus the single cycle machine

What is the speedup of the pipelined machine versus the single cycle machine assuming there are no stalls?What is the speedup of the pipelined machine versus the single cycle machine if the pipeline stalls 1 cycle for 30% of the instructions?

  Create user-s requirements specification for easydrive

Create a user's requirements specification for the EasyDrive School of Motoring database system. Use a single major user view for the application (Director View).

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Explaining relationship of strategic and tactical plans

Descriibe in scholarly detail relationship of strategic, tactical, and operational plans,

  Explaining constraint programming

It is about constraint programming. We have party organizations for being social. Every participant has their own preference list for parties, every party organizers has their own preference list for giving parties, too.

  Largest positive octal number that can be stored in pdp-9

Data was stored in the PDP-9 computer using six-digit octal notation. Negative numbers were stored in 8's complement form. What is the largest positive octal number that can be stored in this machine?

  Explaining security risks for computing infrastructure

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. As part of project to assess security risks for computing infrastructure.

  Difference in tossing a fair coin to get half-and-half hs-ts

When we toss a fair coin, we expect that we get roughly half-and-half Hs and Ts. Of course, this might not happen in general: the question is, how bad can the difference get?

  Explaining responsibility ofconfidentiality to employer

Describe what you must do in such a situation. You know that cost to your present employer will increase if ambiguities are not resolved. Though, you also have a responsibility of confidentiality to previous employer.

  Better software tool internet explorer or mozilla firefox

There are several Internet browsers available today, and many people select which to use without giving it consideration. Explain which is better software tool: Internet Explorer, Mozilla Firefox, or Google Chrome?

  Differentiating unix and window traceroute

Compare and contrast differences between Unix (or Linux) and Window Traceroute. All codes for each ICMP error message are not completely listed and explained.

  Research a writing guide for forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd