Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Characteristics of extreme unencoded micro-instructions?
1. Two sources can be attached by respective control signals to a single destination; though only one of these sources can be used at aninstance. So combinations where both these control signals are active for same destination are redundant.
2. A register can't act as a destination and a source at the same instance. So such a combination of control signals is redundant.
3. We can offerjust one pattern of control signals at aninstance to ALU making some of combinations redundant.
4. We can offerjust one pattern of control signals at aninstance to external control bus also.
So we don't require 2N combinations. Presume we only require 2K (that is less than 2N) combinations then we require only K encoded bits in place of N control signals. K bit micro-instruction is an extreme encoded micro-instruction.
Define race condition. When several process access and manipulate similar data concurrently, then the outcome of the implementation depends on particular order in which the ac
Explain the working of Dynamic RAM? A plain piece of hardware called a DRAM controller can be used to make DRAM behave more like SRAM and the job of the DRAM controller is to p
a) Give eight properties for each of static RAM (SRAM) and DRAM (dynamic RAM) and provide the low-level structure of each type of memory. b) Assume a system with 16 Megabytes o
What is refactoring? Refactoring is explained as the changes to the internal structure of software to improve its design without changing its external functionality. It is an e
Q. Give the difference between Register and Counter. Q. Give the difference between Flip-flop and Latch. Q. Draw a set of waveforms for following signal on out-put line.
Elucidate the purpose of GDTR. If the microprocessor sends linear address 00200000H to paging mechanism, which paging directory entry and which page table entry is accessed? GD
how to set up dhcp
Q. For function F(X, Y, Z) = ∑(1, 2, 3, 5, 6) using TRUTH TABLE only 1. Find POS expression 2. Simplify POS expression 3. Implement this simplified expression using t
Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net
Consider the following instance of the Students relation, sorted by gpa. sid name login age gpa 53831 Madayan madayan@music 11 1.8 53832 Guldu guldu@music 12 2.0 53688 Smith smith
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd