Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Base Register Addressing ?
An addressing technique in which content of an instruction specifies base register is added to address field or displacement field of the instruction. (Refer to Figure below).The displacement field is taken to be a positive number. For illustration if a displacement field is of 8 bits then a memory region of 256 words beginning at address pointed to by base register can be addressed by this mode. This is same as indexed addressing scheme besides that role of Address field and Register is reversed. In the indexing Address field of instruction is fixed and index register value is changed while in Base Register addressing Base Register is common and Address field of the instruction in different instructions is changed. In this particular case:
EA = A+ (B)
D = (EA)
(B) Refers to the contents of a base register B.
Contents of the base register can be changed in the privileged mode only. No user is permitted to alter the contents of the base register. Base-addressing scheme offers protection of users from one another.
This addressing technique is generallyused to relocate the programs in memory particularly in multiprogramming systems in which only value of base register needs updating to reflect beginning of a new memory segment.
Like index register a base register can be a general-purpose register or a special register reserved for base addressing.
formation of bond etc
Q.What is Replacement Policy in cache? When a new block has to be fetched in cache the other block may have to be replaced to make room for new block. Replacement policy determ
Give your analysis for the following problem statement: You require to write a program that calculates the area and perimeter of a rectangle whose dimensions (Length &width) are gi
example pumping lemma.
Q. Describe short note on Information system for strategic advantage? Ans. Strategic role of information systems engage using information technology to develop products or serv
Explain advantage of static storage class The second and more subtle use of 'static' is in connection with external declarations. With external constructs it provides a privacy
List all seven layer of OSI model and describe function of application layer. The layers of OSI model are as follows: (1) The Physical Layer: It defines an interface in
Syntax of recursion int fib(int num) /* Fibonacci value of a number */ { switch(num) { case 0: return(0); break; case 1: return(1); break; default: /* Incl
Indirect addressing mode - assembly language: The Indirect addressing mode and the address field of the instruction refers to the address of a word in memory, which in turn co
Discuss the mount and unmount system calls. The privileged mount system call is used to join a file system to a directory of another file system; the unmount system call detach
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd