How can we decrement and increment operations, Computer Engineering

Assignment Help:

How can we decrement and increment  operations

We  can  implement decrement  and increment  operations  by  using  a  combinational circuit  or  binary  down/up counters.  In  most  of  computers  multiplication  and division are implemented using subtract/add and shift micro-operations. If a digital system has implemented multiplication and division by means of combinational circuits then we can call these as micro-operations for that system. An arithmetic circuit is usually implemented by parallel adder circuits. Each of multiplexers (MUX) of given circuit has two select inputs. This 4-bit circuit takes two inputs of 4-bit data values and carry-in-bit and outputs four resultant data bits and a carry-out-bit.

With different input values we can obtain various micro-operations.

 Equivalent micro-operation Micro-operation name

R V R + R1 2 Add

R V R + R  +11 2 Add with carry

R V R + R1 2 Subtract with borrow

R V R + 2's1 Subtract

R V R1 Transfer

R VR + 11 Increment

R V R - 11 Decrement

 


Related Discussions:- How can we decrement and increment operations

Differentiate between qa and testing, Differentiate between QA and testing....

Differentiate between QA and testing. - Quality Assurance is more a stop thing, ensuring quality in the company and thus the product rather than just testing the product for so

Describe the term- macros, Describe the term- Macros A macro is a key o...

Describe the term- Macros A macro is a key or name which signifies a series of commands or key strokes. Many applications allow single nominated key or single word on a keyboar

How can you have an accession number, Accession number (bioinformatics), a ...

Accession number (bioinformatics), a unique identifier given to a biological polymer sequence (DNA, protein) when it is given to a sequence database.

Emails, Compare and contrast POP e-mail to Web-based e-mail systems in term...

Compare and contrast POP e-mail to Web-based e-mail systems in terms of control, security, and accessibility.

How do the registers help in instruction execution, Q. How do the registers...

Q. How do the registers help in instruction execution? We will discuss this in following steps: Step 1: First step of instruction execution is to fetch instruction which

Explain about the term intranet in brief, Explain about the term Intranet i...

Explain about the term Intranet in brief. Intranet: An Intranet is a form of information system which facilitates communication into the organizations in between widely

Important steps of the boot process, Question: Computer forensic examin...

Question: Computer forensic examiners should be concerned with at least two important settings stored in RTC/NVRAM, which is accessed by the BIOS software most often called Set

Number of addresses in an instruction, Generally the Instruction Set Archit...

Generally the Instruction Set Architecture (ISA) of a processor can be distinguished using five categories:  Operand Storage in the CPU - Where are the operands kept other t

Explain clone process, Explain Clone process. A clone process is genera...

Explain Clone process. A clone process is generated using primitive type clone by duplicating its parent process. However unlike traditional processes it might be share its con

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd