Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Micro-instruction Formats?
Now let's focus on format of a micro-instruction. The two widely used formats employed for micro-instructions are vertical and horizontal. In horizontal micro-instruction every bit of micro-instruction signifies a control signal that directly controls a single bus line or occasionally a gate in the machine. Though the length ofsuch a micro-instruction can be hundreds of bits. A typical horizontal micro-instruction with its related fields is demonstrated in Figure below.
(a) Horizontal Micro-instruction
(b) Vertical Micro-instructions
Figure: Micro- instruction Formats
In a vertical micro-instruction several similar control signals can be encoded in a few micro-instruction bits. For example for 16 ALU operations that may need 16 individual control bits in horizontal micro-instruction only 4 encoded bits are required in vertical micro-instruction. In the same way in a vertical micro-instruction only 3 bits are required to select one of eight registers. Though these encoded bits need to be passed from the respective decoders to get the individual control signals. This is shown in figure above.
Generally a horizontal control unit is faster however requires wider instruction words while vertical control units though; require a decoder are shorter in length. Most of systems employ neither purely vertical nor purely horizontal micro-instructions figure (c) above.
How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P
Based on the disciplines of engineering, AI and physiology robotics is concerned with building robot machines with physical capabilities akin to human beings which are cont
Q. Origin of RISC? In the 1980s a new philosophy developed having optimizing compilers which could be used to compile 'normal' programming languages down to instructions which
FDDI (Fiber Distributed Data Interconnect) is an example of? Fiber Distributed Data Interconnect is an illustration of token ring.
The ?rst task in the project is to develop a sane system to store change logs and versions of ?les. The simplest approach is to create a "dot" directory in the location of the ?le
Which processing is not a part of Synthesis phase? Ans. Perform LC processing is not a part of Synthesis phase.
How do transmission bridges help in satisfying the connectivity? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of
Q. Explain what is Internal Modems ? Internal Modems: Internal Modems plug in expansion slots in your PC. Internal Modems are efficient andcheap. Internal Modems are bus-specif
Q. What is Indirect Addressing Mode explain? Indirect Addressing Mode In the indirect addressing modes operands employ registers to point to locations in memory. So it is
Design a counter modulo 4 (sequential circuit with two flip-flops and one input U) which work like that: 1. When U=0, the state of the flip-flop does not change. 2. Whe
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd