Maintain an absolute address in the instruction register

Assignment Help Basic Computer Science
Reference no: EM131212060

During the course of execution of a program, the processor will increment the contents of the instruction register (program counter) by one word after each instruction fetch, but will alter the contents of that register if it encounters a branch or call instruction that causes execution to continue elsewhere in the program. Now consider Figure 7.8. There are two alternatives with respect to instruction addresses:

• Maintain a relative address in the instruction register and do the dynamic address translation using the instruction register as input. When a successful branch or call is encountered, the relative address generated by that branch or call is loaded into the instruction register.

• Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register.
Which approach is preferable?

148_fd5a7552-75f5-4ff1-b68b-5f1f14be84f7.png

Reference no: EM131212060

Questions Cloud

Could this sequence be used to establish a buddy system : What would be the advantage of this system over the binary buddy system described in this chapter?
Select agent of socialization and describe a specific norm : Select one agent of socialization and describe a specific norm.- , Discuss how the norm might influence a particular social role.
Perform common operations : 1) MATLAB has several types of built-in math functions that can help you perform common operations. a) Write the MATLAB code that takes the absolute value of -134.
Maintain an absolute address in the instruction register : Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register.Which approach is preferable?
Recognized in the consolidated income statement : Houston Corporation operates a branch operation in a foreign country. Although this branch deals in pesos, the U.S. dollar is viewed as its functional currency. Thus, a remeasurement is necessary to produce financial information for external reportin..
What is symmetric cryptosystems : What is Symmetric Cryptosystems and Asymmetric Cryptosystems?
Question-shell programming : You have created the directory structure and some base files to be used by the Web server and Web site. For the Web site to be created in a production environment, you need to package your commands in a script so that the patching team can run the..
Explain what did you learn from the interview : What did you learn from the interview? How did the interviewee and/or the interview help you gain a deeper understanding of your topic? Other findings?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the sample space of the experiment

What is the sample space of the experiment?

  Edge head honchos in commercial enterprises

Name two cutting edge head honchos in commercial enterprises, for example, PC innovation and excitement. In what ways would they say they are like "magnates" in American history, for example, Carnegie, Morgan, or Rockefeller?

  How effective leader can manage changes for new technology

Write down separate 350-word document which explains how the effective leader can manage changes implementing this new technology might need.

  Give a 3nf decomposition of r based on the canonical cover

Give a 3NF decomposition of r based on the canonical cover.

  Explaining dns zone in secure dynamic updates

If a DNS zone accepts only secure dynamic updates and the DHCP server is a member of the DnsUpdateProxy security group.

  Describe the complexities of auditing a cloud computing

1. explain the role auditing plays in the context of achieving trustworthy systems. 2. explain the complexities of

  Explain most likely causes for failed technology projects

Discuss the three (3) most likely causes for failed technology projects.

  Webcam or computer microphone to spy on them

What does the Law say about using someone's Webcam or Computer Microphone to spy on them?

  Design the program on vb

1. Design the GUI and code for a program that will allow a user to enter three test scores. The program should then calculate the test average and display it.

  How many times each function has been called

how many times each function has been called

  Designing the circuit which can scale the voltage

Design a circuit that can scale the voltage from a sensor with range of 0mV - 100mV to the range of 0V - 5V. Now feed this conditioned signal into a 12-bit ADC with VRL = 0 and VRH = 5V and determine the voltage (from the sensor) that will generat..

  What is a suitable network design for an office space

What is a suitable network design for an office space with 4 cubicles, 1 office, 1 server room, conference room.  The design has a web server, file server, regular server with 6 computers, 3 color printers, and needs high speed internet and wireless ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd