Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
CISC Characteristics :
The design of an instruction set for a computer might take into consideration not only machine language constraints, but also the requirements imposed on the use of high-level programming languages. The translation from high-level to machine language programs is done by means of a compiler program. One cause for the trend to provide a complex instruction set is the desire to simplify the compilation and improve the overall computer performance. The task of a compiler is to produce a sequence of machine instructions for each high-level language statement. The job is simplified if there are machine instructions that implement the statements directly. The important aim of CISC architecture is to attempt to provide a single machine instruction for each statement that is written in a high-level language .An Examples of CISC architectures are the Digital Equipment Corporation VAX computer and the IBM 370 computer.
The main characteristics of CISC architecture are:
1. A large number of instructions-usually from 100 to 250 instructions.
2. Some instructions that perform specialized tasks and are used infrequently.
3. A vast variety of addressing modes-typically from 5 to 20 different modes.
4. Variable-length instruction formats.
5. Instructions that manipulate operands in memory.
wap proram for bthe addition of two 3*3 matrix
Fourth Generation Microprocessor : The single chip 32-bit microprocessor was introduced in 1981 by Intel as iAPX 432. The other 4th generation microprocessors were; Hewlett
DAA: Decimal Adjust Accumulator:- This instruction is utilized to convert the result of the addition operation of 2 packed BCD numbers to a valid BCD number. The conclusion has to
write an assembly language program that has two subroutines : one for encrypting alphabates of a string and second fo decrypting the encoded string . in encryption simply converta
what is sahf nstrucions
Cache Memory Caching is a technology based on the memory subsystem of any computer. The majoraim of a cache is to accelerate the computer while keeping the cost of the computer
What is the hex for + and - under with a sum involved
Port Mapped I/O or I/O Mapped I/O I/O devices are mapped into a separate address space. This is generally accomplished by having a different set of signal lines to denote a mem
#question. counters using 8051.
EVOLUTION OF MICROPROCESSOR : The digital circuits and systems may be broken into two part: 1) Sequential Circuit and 2) Combinational Circuits Norm
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd