Give detail explanation about arithmetic micro-operations, Computer Engineering

Assignment Help:

Give detail explanation about Arithmetic Micro-operations

These micro-operations perform some essential arithmetic operations on numeric data stored in the registers. These basic operations can be addition, subtraction, incrementing or decrementing a number and the last one is arithmetic shift operation. An 'add' micro-operation may be specified as: R V R + R3 1 2

It implies: add contents of registers R and R and store sum in register R .1 2 3

The add operation mentioned over requires three registers along with addition circuit in ALU.

Subtraction is implemented with complement and addition operation as:

 R  V R - R3 1 2 is implemented as

 R  V R + (2's complement of R )3 1 2

 R  V R + (1's complement of R  + 1)3 1 2

 R  V R + R  + 13 1 2

An increment operation can be shown as:

 R  V R + 11 1

While a decrement operation can be refer as:

 R  V R - 11 1

 


Related Discussions:- Give detail explanation about arithmetic micro-operations

RS232C schematic diagram, Can someone provide me a scehmatic diagram of RS2...

Can someone provide me a scehmatic diagram of RS232C with explanation?

What are the process states, What are the Process states? By the course...

What are the Process states? By the courses of implementation, processes change state. Status of a process is express by its present activity. Dissimilar practical states of

Show programming based on data parallelism, Q. Show Programming Based on Da...

Q. Show Programming Based on Data Parallelism? In data parallel programming model the focal point is on data distribution. Every processor works with a part of data. We will co

Show system call for cloning, Show System call for cloning.  Standard f...

Show System call for cloning.  Standard form of Clone function is as follows: Int clone (Int (*FN) (), void *child stack, Int flag, intargs,); Parameter FN is Pointer fro

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

What is importance of xml into edi and electronic commerce, What is the imp...

What is the importance of XML into EDI and electronic commerce? XML has been explained as lightweight SGML: XML demonstrates great promise for its inherent capability to per

How is recursion handled internally, How is recursion handled internally? ...

How is recursion handled internally? Internally, every recursive call to a function requires storing the intermediate values of the parameters and local variables in a run time

Differences between flexgrid control and dbgrid control, Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Illustration of display on video monitor, Q. Illustration of Display on Vid...

Q. Illustration of Display on Video Monitor? Displaying a single character ; display contents of BL register (Presume that it has a single character) MOV AH, 02H MOV D

What is effective address, Q. What is Effective Address ? The symbol EA...

Q. What is Effective Address ? The symbol EA (Effective Address) refers to a physical address in a non-virtual memory environment and refers to a register in a virtual memory a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd