Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
With the increasing use of more and higher level languages manufacturers had offered more powerful instructions to support them. It was claimed that a stronger instruction set will decrease the software crisis and will simplify the compilers. Another significant reason for such a movement was desire to improve performance.
Yet even though instructions which were closer to high level languages were implemented in Complex Instruction Set Computers (CISCs) still it was hard to use these instructions because compilers were required to find those conditions which exactly fit those constructs. Additionally task of optimising generated code to minimise code size, decrease instruction execution count and improving pipelining is much more difficult with these type of complex instruction set.
Another motivation for increasingly complex instruction sets was that complex HLL operation would execute more rapidly as a single machine instruction instead of as a series of more primitive instructions. Thoughdue to the bias of programmers in the direction of use of simpler instructions it may turn out otherwise. CISC makes more complex CU with larger microprogram control store to accommodate a richer instruction set. This enhances the execution time for simpler instructions.
So it is far from clear that trend to complex instruction sets is appropriate. This has led some groups to pursue opposite path.
Q. Computational Fluid Dynamics? Computational Fluid Dynamics: CFD was a FORTRAN like language developed in the early 70s at "Computational Fluid Dynamics Branch of Ames Resear
The various memory allocation functions are described below: (i) malloc( ) : It is a memory allocation function that assigns requested size of bytes and returns a pointer to t
A three stage network is realized by using switching matrices of size p x s in stage 1, r x r matrices in stage 2 and s x p matrices in stage 3. Using the Lee's probability graph s
Can you delete a domain, which is being used by data elements? No.
Q. Show MPI functions? MPI comprises hundreds of functions which are a small subset of which is enough for most practical purposes. We will discuss some of them here. Int M
The memory allocation scheme subject to “external” fragmentation is? Segmentation is the memory allocation scheme subject to “external” fragmentation.
A program is backward compatible if it can use files from an older version of itself. For a file saved in the program to be backward compatible, it must be possible to open the fil
What are conditions under which a deadlock situation may arise? A deadlock situation can arise if the following four conditions hold concurrently in a system: a. Mutual exc
What is the importance of XML into EDI and electronic commerce? XML has been explained as lightweight SGML: XML demonstrates great promise for its inherent capability to per
Q. Explain Open-systems interconnections architecture model The most common network architecture model is the open-systems interconnections (OSI). Figure shows the ISO (Intern
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd