How can we decrement and increment operations, Computer Engineering

Assignment Help:

How can we decrement and increment  operations

We  can  implement decrement  and increment  operations  by  using  a  combinational circuit  or  binary  down/up counters.  In  most  of  computers  multiplication  and division are implemented using subtract/add and shift micro-operations. If a digital system has implemented multiplication and division by means of combinational circuits then we can call these as micro-operations for that system. An arithmetic circuit is usually implemented by parallel adder circuits. Each of multiplexers (MUX) of given circuit has two select inputs. This 4-bit circuit takes two inputs of 4-bit data values and carry-in-bit and outputs four resultant data bits and a carry-out-bit.

With different input values we can obtain various micro-operations.

 Equivalent micro-operation Micro-operation name

R V R + R1 2 Add

R V R + R  +11 2 Add with carry

R V R + R1 2 Subtract with borrow

R V R + 2's1 Subtract

R V R1 Transfer

R VR + 11 Increment

R V R - 11 Decrement

 


Related Discussions:- How can we decrement and increment operations

Rsa encryption function- cryptography, The general method for constructing ...

The general method for constructing the parameters of the RSA cryptosystem can be described as follows: Select two primes p and q Let N = pq and determine ∅ (N) = (p - 1

Simple instruction formats, Simple instruction formats: RISC uses simpl...

Simple instruction formats: RISC uses simple instruction formats. Usually only one or a few instruction formats are used. In these machines instruction length is fixed and alig

Determine the minimal sum of products for boolean expression, Determine the...

Determine the Minimal sum of products for the Boolean expression? Obtain the minimal sum of products for the Boolean expression f=(1,2,3,7,8,9,10,11,14,15) using Quine-McCluske

Illustrate the disadvantages of wireless technology, Disadvantages of wirel...

Disadvantages of wireless technology -  Range can be very limited -  Possible interference from nearby electronic devices -  Security issues (i.e. tapping illegally into

Contraposition, Contraposition : The contraposition equivalence is as ...

Contraposition : The contraposition equivalence is as follows:  So it may seem a small strange at first, this means that it appears which we have said nothing in the f

Shell scripting, Write a script called addnames that is to be called as fol...

Write a script called addnames that is to be called as follows, where classlist is the name of the classlist file, and username is a particular student''s username. ./addnames cla

Main features of TCP, The main features of TCP are: Reliability: TCP...

The main features of TCP are: Reliability: TCP makes sure that any data sent by a sender arrives at destination as it was sent. There can't be any data loss or change in the

Floating point arithmetic pipelines, Floating point Arithmetic pipelines ...

Floating point Arithmetic pipelines Floating point computations are the finest candidates for pipelining. Take the instance of addition of two floating point numbers. Following

The values 15 and 11 can also be defined by variable, In the statement Writ...

In the statement Write:/15(10) lfa1-lifnr. The values 15 and 11 can also be defined by variable. No, the value of 11 nad 15 is not described by variable.

What is anonymous file transfer protocol, What is Anonymous File Transfer P...

What is Anonymous File Transfer Protocol? Anonymous FTP: While a FTP client contacts a server, in that case, the daemon will ask for an account number or username and it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd