Execution of a machine instruction, Basic Computer Science

Assignment Help:

Execution of a machine instruction:

Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cycle typically involves Fetch, Decode, Execute and Write back cycles. During Fetch cycle the instruction is fetched from memory. During Decode cycle the instruction is processed by the control unit of the CPU, which generate the set of micro-operations and timing signals required to execute the instruction. The micro-operations are then executed during Execute cycle to complete the instruction and any results generated are then written back to memory during Write back cycle. An instruction cycle may also involve one or more operand fetch cycles. The control unit is responsible for overall control and coordination of instruction execution. It generates the set of micro-operations either through a hard wired logic or with the help of micro program sequencer. Executing a program therefore involves executing a large number of machine instructions, where every machine instruction execution requires executing several micro-operations.      


Related Discussions:- Execution of a machine instruction

Third generation of computers, THE THIRD GENERATION (1966-1975) ...

THE THIRD GENERATION (1966-1975) The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid

Access time - storage devices, Access time: Access time: This is the t...

Access time: Access time: This is the time required to locate and retrieve stored data from the storage unit in response to a program instruction. That is the time interval be

Assignment Help, How would you format while loops to fufill my project writ...

How would you format while loops to fufill my project write up?

Types of policy, want to get detail understanding of the types of security ...

want to get detail understanding of the types of security policies including enterprise security policy, issues specific policies etc

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

What are the features that bash shell provides, Question 1 What are the fe...

Question 1 What are the features that Bash shell provides? Question 2 Explain Runlevels Question 3 Discuss the following                           1) Links 2) Doma

Computer, what is the first computer in this world

what is the first computer in this world

Outdoor patient department features - a doctor module, A Doctor Module ...

A Doctor Module Doctor has a list of the patients waiting for consultation. The doctor's module should include all the following details: Fields for common complaint

Why is the atm selected as a transport network in 3g, Why is the ATM select...

Why is the ATM selected as a transport network in 3G? Answer: ATM provides efficient support for transmission of voice, data, and video ATM provides QoS guarantee and reliability

Search problems in artificial intelligence, Specifying Search Problems ...

Specifying Search Problems In our agent terms, a problem to be solved is a particular task where the agent starts with the environment in a given state and acts upon the enviro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd