description of Instruction execution, Basic Computer Science

Assignment Help:
When software is installed onto a modern day personal computer (most commonly from a CD-ROM, though other media or downloading from the internet is also common), code comprising the program and any associated files is stored on the hard drive. This code comprises of a sequence of instructions for performing designated tasks, and data associated with these instructions. The code remains there until the user chooses to execute the program in question, on which point sections of the code are loaded into the computer’s memory.
The CPU then executes the program from memory, processing every instruction in turn. Certainly, in order to execute the instructions, it is necessary for the CPU to understand what the instruction is telling it to do. Consequently, recognition for instructions that could be encountered requires to be programmed into the processor. The instructions that can be recognized by a processor are referred to as an ''instruction set'',
Once the instruction has been recognized, and the actions that should be carried out are decided upon, the actions are then performed before the CPU continues on to the next instruction in memory. This process is called the ''instruction execution cycle'',
Results can then be accumulated back in the memory, and later saved to the hard drive and perhaps backed up onto removal media or in separate locations

Related Discussions:- description of Instruction execution

FCB files:Channels of communication , The use of manage files very much fac...

The use of manage files very much facilitates the creation of files and programmer can focus on other aspects of the programming lacking worrying on details which can be handled by

Problem - programming language, Problem - programming language: A Prob...

Problem - programming language: A Problem is to carry out a particular task. For solving the problem, some input has to be given to the system. The system will process or mani

Explain the different methods of encryption technique, Problem When a d...

Problem When a data is sent across the network it is encrypted and arranged in a way that even if there is a diversion in the flow of data should not leak the data. At the rece

Accessing folders and printers, Accessing Folders and Printers Accessi...

Accessing Folders and Printers Accessing folders, files and printers of another computer is as easy as accessing another computer. To access folders and printers of another c

Kids, how do you let kids learn on it

how do you let kids learn on it

Management information systems, how to introduce information system an in o...

how to introduce information system an in organization

Discuss the attributes of speech codec, Question 1 What is mobile telephon...

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

Goals of autonomous rational agents, Goals of Autonomous Rational Agents: A...

Goals of Autonomous Rational Agents: Artificial intelligence One possible way to improve an agent's performance is to enable it to have some kind of details about what it is tr

Explain Modern architecture of microprocessor, There are many other techniq...

There are many other techniques in which companies who manufacture microprocessors have attempted to get better the performance of their CPUs. Cache memory this is a small quantit

Types of computer, types of computer on the basis of shape, size & resource...

types of computer on the basis of shape, size & resources

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd