Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Fundamental differences between RISC and CISC architecture?
Fundamental differences between RISC and CISC architecture. The following table lists following differences:
CISC
RISC
1. Large number of instructions - from
120 to 350.
1. Relatively fewer instructions - less than 100.
2. Employs a variety of data types and a large number of addressing modes.
2. Relatively fewer addressing modes.
3. Variable-length instruction formats.
3. Fixed-length instructions generally 32 bits, easy to decode instruction format.
4. Instructions manipulate operands residing in memory.
4. Mostly register-register operations. The only memory access is by explicit LOAD/STORE instructions.
5. Number of Cycles Per Instruction (CPI) varies from 1-20 depending upon the instruction.
5. Number of CPI is one as it uses pipelining. Pipeline in RISC is optimised due to simple instructions and instruction formats.
6. GPRs varies from 8-32. But no support is available for the parameter passing and function calls.
6. Large number of GPRs are available which are mainly used as Global registers and as a register based procedural call and parameter passing stack so optimised for structured programming.
7. Microprogrammed Control Unit.
7. Hardwired Control Unit.
With relevant logic diagram and truth table explain the working of a two input EX-OR gate. Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an od
Suppose the random sample used for each tree in the previous random forest is decreased from 1000 rows to 500 rows. Circle ALL that are true for the ensemble classifier. a) Vari
What is normal form? A normal form is a guideline for relational database tables that enhances data consistency. As tables satisfy higher levels of normal forms, they are less
Permanently resident pages: Every virtual memory systems have memory areas that are "pinned down", for example cannot be swapped out to secondary storage, for instance:
How many types of assemblies are there? Private, Public/Shared, Satellite. A private assembly is normally used by a one application, and is stored in the application's director
Modus ponens rule: In fact the general format for the modus ponens rule is as follows: like if we have a true sentence that states the proposition A implies proposition B and
Conversion of decimal number 25.5 into binary number Ans. There is integer part is 25 and fractional part is 0.5. Firstly convert the integer part 25 in its equal to binary numb
Each group is required to complete a group assignment on the analysis, modelling and classification of one of the following classes of mechanisms encountered in robotics and indust
An expert system has death that is it operate effectively in a narrow domain containing difficult challenging problems. Thus the rules in an experts systems are necessarily co
Q. Explain Bus Interface Unit? BIU (Bus Interface Unit) mainly interacts with system bus. It executes nearly all the activities relating to fetch cycle like: Computing
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd