Cisc or of risc design

Assignment Help Basic Computer Science
Reference no: EM132124759

The following few machines are given informal descriptions. Decide whether they are of CISC or of RISC design, and provide a short description of why.

a) Machine A has over 300 instructions, many of which are executed at most once per program.

b) Processor B has only 50 machine instructions, and a general-purpose register bank.

c) Processor C has 15 different addressing schemes and four accumulator registers. Most of its instructions involve reading from memory directly into the accumulator. Most of its instructions have only one address, but the few that don't, take up fewer bits.

d) Processor D was designed specifically as a network-of-devices monitoring chip. It can read in data from memory (expected to be placed there by some device) and do simple math upon it in the same operation. However, it has less than 100 instructions, in a total of four formats, as there are a lot of features it's missing. (For example: all math operations are computed in a fixed width.)

Reference no: EM132124759

Questions Cloud

Why are we in the golden age of technology entrepreneurship : Why are we in the 'golden age' of technology entrepreneurship? What factors are helping entrepreneurs more rapidly achieve their vision, and with a lower cost?
Write a report on the project IT risks based on the scenario : ITC596 IT RISK MANAGEMENT ASSIGNMENT - You will write a report on the project IT risks based on the scenario
Proposed collective bargaining agreement : Which of these terms in the proposed collective bargaining agreement would be allowed under federal labor law?
Communications consultant working for houstoncomm services : You are a networking and communications consultant working for HoustonComm Services, Inc, further referred to as HCS. HCS is a company providing technology
Cisc or of risc design : The following few machines are given informal descriptions. Decide whether they are of CISC or of RISC design, and provide a short description of why.
Decision support systems : Decision support systems (DSS). What sorts of DSS tools do you use at your work - e.g., what-if analysis, sensitivity analysis, scenario analysis
In linux what synchronization methods : In Linux what synchronization methods they use within the kernel, please dig into your findings for Linux.
What will a firewall not protect from : What will a firewall not protect from? Why implement a firewall?
Write an application that demonstrates using objects : Write an application that demonstrates using objects of each class. Save the files as Horse.java, RaceHorse.java, and DemoHorses.java.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Assignment information in the assignment description

Using the scenario and assignment information in the Assignment Description, discuss with your group how you should divide the tasks evenly among the members.

  What proportion of total employees are women

Typically Women stay with the company 50% longer than men do. What proportion of total employees are women?

  Hormone replacement therapy

When women go through menopause, the production of hormones in their bodies changes. The hormonal changes can cause a variety of symptoms

  Mix of frito-lay inventory

How does the mix of Frito-Lay's inventory differ from those at a machine or cabinet shop (a process-focused facility)?

  Construct a two-way tabulation with rows for the city areas

Construct a two-way tabulation with rows for the city areas and columns for the method of payment. Work out the figures that are not quoted in the summary by using the information provided

  Prevent sql injection attack

Why a Firewall can not prevent SQL injection attack?

  Introduction globally a success

Can you please provide an example of organizations that have effectively introduced products into foreign markets like Wal-Mart that did succeed?

  Would the acquisition strategy affect your role

As a systems analyst, what would your role be in helping Sandy Shores develop a new system? Would the acquisition strategy affect your role? Why or why not?

  Information in the node

1) Write a client method that returns a reference to the information in the node with the "largest" value in a binary search tree. the signature method is:

  What is the difference between clinical registries

What is the difference between clinical registries/databases and clinical guideline/protocols?

  Describe the role of cybersecurity

Describe the role of cybersecurity within the credit card payment security.  Describe security associated with the PCI DSS (Payment Card Industry Data Security Standard) and how cybersecurity will address them.

  What are the absolute and relative errors for both totals

Run the program with a reporting interval of 1 to determine the first iteration in which there is a difference between the two computations. What are the absolute and relative errors for accumulated at that point? Is there an error for multiplied?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd