Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
The micro-instruction cycle can comprises two basic cycles: the fetch and execute. Here in the fetch cycle address of micro-instruction is produced and this micro-instruction is put in a register used for address of a micro-instruction for execution. Execution of a micro-instruction simply means production of control signals. These control signals can drive CPU (internal control signals) or system bus. Format of micro-instruction and its contents decide the complexity of a logic module that executes a micro-instruction.
One of the major features incorporated in a micro-instruction is encoding of micro-instructions. What is encoding of micro-instruction? For answering this question let's recall Wilkes control unit. In Wilkes control unit every bit of information either produces a control signal or form a bit of subsequent instruction address. Now let's presume that a machine requires N total number of control signals. If we follow Wilkes scheme we need N bits one for each control signal in CU.
Super scalar architecture Pentium microprocessor is organized with three execution units. One executes floating-point instructions and other two (U-pipe and V-pipe) execute in
Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.
Put an "X" next to any of the following that are RISC CPU characteristics that show diffrence between RISC from CISC a) has limited addressing modes b) used in Motorola 6000 pro
What is branch folding? The instruction fetch unit has implemented the branch instruction concurrently with the implementation of other instructions. This technique is referred
State the SELECTIVE CLEAR - logic micro operations The selective-clear operation clears to 0 bits in register A only where there are corresponding 1's in the register B. For
(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by
Associative Mapping: It is a more flexible mapping technique A primary memory block can be placed into any specific cache block position. Space in the cache may be
Prolog Programming Language - Artificial intelligence: Most of the programming languages are procedural: the programmer specifies exactly the correct instructions (algorithms)
What are the Touch Panels In case of touch panels, displayed objects or screen positions is allowed to be selected with the touch of a finger. A typical application of touch pa
Q. Explain the odd-even transposition algorithm? The algorithm needs one 'for loop' beginning from I=1 to N it implies that N times and for every value of I, one 'for loop' of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd