Convention used to represent micro-operations, Computer Engineering

Assignment Help:

Q. Convention used to represent micro-operations?

The convention used to represent micro-operations is:

1.  Computer register names are designated by capital letters (sometimes followed by numerals) to denote its function. For illustration R1, R2 (General Purpose Registers), AR (Address Register), IR (Instruction Register) etc. 

2. Individual bits within a register are numbered from 0 (rightmost bit) to n-1 (leftmost bit) as shown in Figure below). Common ways of drawing block diagram of a computer register are displayed below. The name of 16-bit register is IR (Instruction Register) that is partitioned into two subfields in Figure D below). Bits 0 through 7 are assigned the symbol L (for Low byte) and bits 8 through 15 are assigned symbol H (for high byte). Symbol IR (L) refers to low-order byte and IR (H) refers to high-order byte.

569_Convention used to represent micro-operations.png

Figure: Register Formats

 


Related Discussions:- Convention used to represent micro-operations

Artificial intelligence agents, Artificial Intelligence Agents: We int...

Artificial Intelligence Agents: We introduced what we'll be conversation about in Artificial Intelligence and why those things are necessary. This discussion is of course abou

What is a heap, What is a heap? A complete binary tree, every of whose ...

What is a heap? A complete binary tree, every of whose elements contains a value that is  greater than or equal to the value of every of its children is known a Heap

What happens to logic after synthesis, What happens to logic after synthesi...

What happens to logic after synthesis, which is driving an unconnected output port that is left open (, that is, noconnect) during its module instantiation? An unconnected out

What is an advantage of executing a process in background, What is an advan...

What is an advantage of executing a process in background? The most common reason to put a process in the background is to permit you to do something else interactively without

Threads, First, remember that different processes keep their own data in di...

First, remember that different processes keep their own data in distinct address spaces. Threads, on the other hand, explicitly share their entire address space with one another. A

Which memory can not be accessed randomly, Which of following can not be ac...

Which of following can not be accessed randomly DRAM, SRAM, ROM or Magnetic tape ? Ans. Magnetic tape cannot be accessed randomly; it can only be accessed sequentially.

Difference between shadow and override in programming, Overriding tell us o...

Overriding tell us only the methods, but shadowing tells us the entire element.

What is a cgi bin directory, A CGI bin directory is a special directory on ...

A CGI bin directory is a special directory on the server where CGI scripts are allowed to be implemented. Most servers are configured to only permit CGI scripts to be implemented f

Show the properties of frame tag, Q. Show the properties of Frame Tag? ...

Q. Show the properties of Frame Tag? This tag is used for placing an HTML file in the frame created. We should now tell browser what to put in every frame.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd