Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Fundamental differences between RISC and CISC architecture?
Fundamental differences between RISC and CISC architecture. The following table lists following differences:
CISC
RISC
1. Large number of instructions - from
120 to 350.
1. Relatively fewer instructions - less than 100.
2. Employs a variety of data types and a large number of addressing modes.
2. Relatively fewer addressing modes.
3. Variable-length instruction formats.
3. Fixed-length instructions generally 32 bits, easy to decode instruction format.
4. Instructions manipulate operands residing in memory.
4. Mostly register-register operations. The only memory access is by explicit LOAD/STORE instructions.
5. Number of Cycles Per Instruction (CPI) varies from 1-20 depending upon the instruction.
5. Number of CPI is one as it uses pipelining. Pipeline in RISC is optimised due to simple instructions and instruction formats.
6. GPRs varies from 8-32. But no support is available for the parameter passing and function calls.
6. Large number of GPRs are available which are mainly used as Global registers and as a register based procedural call and parameter passing stack so optimised for structured programming.
7. Microprogrammed Control Unit.
7. Hardwired Control Unit.
What are the characteristics of the E-Cash? These kinds of payments, turning the Internet within a transaction oriented forum, need mediums which are easy and cheap (through a
Parallel computing has been a topic of interest in computing society over the previous few decades. Ever-growing amount of databases and increasing complexity of new problems are
what is hashing
What is a flip-flop? Ans. Flip-flop is particular bit memory cell. This stores individual bit information in its true and compliment form. It is the basic block of any sequ
Using each connected device is assigned a time slot whether or not the device has anything to send. (A) WDM (B) FDM
Describe the VON NEUMANN ARCHITECTURE Most of present computer designs are based on idea developed by John vonNeumann referred to as the VON NEUMANN ARCHITECTURE. V
Q. What is Input - Output Instructions? An I/O instruction is stored in memory of computer and is fetched as well as executed by processor producing an I/O-related command for
Explain about CSMA/CD It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other statio
Rational Testmanager is a complicated tool that can be used for automating performance tests on client/server systems. A client/server system have client applications accessing a d
In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Blocking probability Given: N =M =512,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd