Determine about the memory stack, Computer Engineering

Assignment Help:

Memory Stack

Stack could exist as a stand-alone unit or could be executed in a random-access memory attached to the CPU. The implementation of a stack in a CPU is done by assigning portion of memory. A portion of memory is assigned to the stack operation and the processor register is used as a stack pointer to execute stack in CPU. Figure below represent a portion of computer memory partitioned into three segments -program, data and stack. The address of next instruction in program is located by program counter PC while an array of data is pointed by an address register AR. The top of stack is located by stack pointer SP. The three registers are connected to the common address bus that connects three registers and either one can provide the address for memory. PC is used during fetch phase to read an instruction. AR is used during execute phase to read an operand. SP is used to push or pop items into or from stack.

 

1817_Memory Stack.png


Related Discussions:- Determine about the memory stack

Illustrate working of magnetic bubble memories, Q. Illustrate working of Ma...

Q. Illustrate working of Magnetic Bubble Memories? In many materials like garnets on applying magnetic fields certain cylindrical areas whose direction of magnetization is oppo

Hashing collision resolution techniques, Hashing collision resolution techn...

Hashing collision resolution techniques are a) Chaining, b) Bucket addressing

Identifying stakeholders, I have chosen an imaginary example to illustrate...

I have chosen an imaginary example to illustrate the different stakeholder categories. At Home sells a selection of consumer products, currently listed in a paper catalogue, whi

How free-space is managed using bit vector implementation, How free-space i...

How free-space is managed using bit vector implementation? The free-space list is executed as a bit map or bit vector. Each block is shown by 1 bit. If the block is free, the b

How to convert binary to octal and hexadecimal, Q. How to convert Binary to...

Q. How to convert Binary to Octal and Hexadecimal? Rules for these conversions are simple. For converting binary to octal binary number is splitted in groups of three, that are

Determine about the web based tools, Determine about the Web Based Tools ...

Determine about the Web Based Tools HTML, XML, CGI and other open standards As is well known, the Web as well as Intranets speak and understand only one language i.e., th

What is the difference between eprom and eeprom, Question 1: (a) Wha...

Question 1: (a) What is the difference between IT (Information Technology) and ICT(Information Communication Technology) (b) Explain why information systems are so im

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

Why do businesses need systems analysts, Q. Why do businesses need systems ...

Q. Why do businesses need systems analysts? A computerized system allows an organization to provide accurate information and respond faster to queries, events etc. If a busines

Different types of addressing modes, Described different types of addressin...

Described different types of addressing modes available? Ans: The various types of addressing modes available are following:   Register addressing mode   Immediate ad

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd