Execution of a machine instruction, Basic Computer Science

Assignment Help:

Execution of a machine instruction:

Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cycle typically involves Fetch, Decode, Execute and Write back cycles. During Fetch cycle the instruction is fetched from memory. During Decode cycle the instruction is processed by the control unit of the CPU, which generate the set of micro-operations and timing signals required to execute the instruction. The micro-operations are then executed during Execute cycle to complete the instruction and any results generated are then written back to memory during Write back cycle. An instruction cycle may also involve one or more operand fetch cycles. The control unit is responsible for overall control and coordination of instruction execution. It generates the set of micro-operations either through a hard wired logic or with the help of micro program sequencer. Executing a program therefore involves executing a large number of machine instructions, where every machine instruction execution requires executing several micro-operations.      


Related Discussions:- Execution of a machine instruction

C programming, input is n positive numbers and reverse it, out put gv the a...

input is n positive numbers and reverse it, out put gv the absolute difference and give the reverse(magic number),using function reverseinteger, and function generate magicnumber

Types of computer, types of computer on the basis of shape, size & resource...

types of computer on the basis of shape, size & resources

Theory of computation, If L is a regular language show that L U {a} is regu...

If L is a regular language show that L U {a} is regular

GNF, what does it means

what does it means

Telephobn directory, #que1) Create telephone directory. • The heading shoul...

#que1) Create telephone directory. • The heading should be 16-point Arial font in bold • The rest of the document should use 10-point font size • Other headings should use 10-point

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Need a help, i am currently studying my computer science engineering 2nd yr...

i am currently studying my computer science engineering 2nd yr. i am unable to select what specification should i take please help me

Problem solving using a computer, PROBLEM SOLVING USING A COMPUTER The ...

PROBLEM SOLVING USING A COMPUTER The following steps are required for solving a problem using a computer system:     Problem Definition     Program Planning (Preparati

Operation system, how to create 1000 random processes with time scales betw...

how to create 1000 random processes with time scales between 10 to 400 milliseconds

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd