two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Discuss in detail about delphi method, Discuss in detail about Delphi Metho...

Discuss in detail about Delphi Method. Procedure The co-ordinator represents a specification and assessment form to each expert. Co-ordinator calls a group discussion

Define data objects and relationship, Define Data objects, attributes & rel...

Define Data objects, attributes & relationship. Data object: Representation of any collective  information that must be understood by software. It can be any external entity.

Describe about unit testing, Q. Describe about Unit Testing? Unit Testi...

Q. Describe about Unit Testing? Unit Testing: The unit testing is completed to test the individual module of the software. Test cases are designed to test the program functiona

Software configuration management , Software configuration management is a...

Software configuration management is an umbrella activity which is applied by the software procedure. SCM identifies controls, audits and reports modifications that invariably occ

Explain information management strategy, Question: (a) ‘Information Str...

Question: (a) ‘Information Strategy involves the encompassing of an organisation's information requirements and information systems planning with its long-term objectives.' T

Software methodology, how to choose a software methodology for a software p...

how to choose a software methodology for a software project

What are the debugging programs, Q. What are the Debugging programs? De...

Q. What are the Debugging programs? Debugging programs:-A program which runs simultaneously with the program under test and provides commands to examine memory and registers st

State lehman first law, State Lehman's First law A program that is used...

State Lehman's First law A program that is used in real world environment of necessity must change or become progressively less useful in that environment.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd