Designing the instruction set

Assignment Help Operating System
Reference no: EM13692222

Problem: Let say you are designing the instruction set for a new type of computer. The computer has 64 instructions, 16 general purpose registers. It supports a byte addressable memory of up to 32MB.

Question 1. For a 3-operand ADD instruction that only uses register addressing mode, how long (number of bits) should the instruction be?

Question 2. For a 2-operand ADD instruction, in which one of the operands is a memory location with direct addressing mode, how long (number of bits) should the instruction be?

Describe each and every question in depth with examples.

Reference no: EM13692222

Questions Cloud

Construct 4 instances of your instrument : Create a Java test class that simulates using your MusicalInstrument class.  In your test class you should at a minimum construct 4 instances of your instrument,
How could those redundancies lead to anomalies : If you want to produce a listing of the file contents by last name, area code, city, state, or zip code, how would you alter the file structure?
What is the inductive hypothesis : Show that the base case is true and What is the inductive hypothesis P(k)?
How might the tables be related to one another : What tables would you create, and what would the table components be and How might the (independent) tables be related to one another?
Designing the instruction set : For a 3-operand ADD instruction that only uses register addressing mode, how long (number of bits) should the instruction be?
Why do internet telephony protocols run on top : Why do Internet telephony protocols run on top of UDP rather than on TCP - UDP is use because a connection is not needed to be maintained by some internet telephony applications.
Program that would display a letter to a friend : Writing a c++ program that would display a letter to a friend? It should have a proper format like name, friends name, address.....etc
Decimal to the ieee 32 bit floating point : Numbers from decimal to the IEEE 32 bit floating point - binary IEEE 32-bit floating point to decimal.
Inheriting from the jframe class : What is the difference between inheriting from the JFrame class and using a JFrame member variable?

Reviews

Write a Review

Operating System Questions & Answers

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  Question about it planning

Some companies think that IT planning is a waste of time because the competitive environment and technologies change too rapidly.

  Construct resource allocation graph with processers

Construct a resource allocation graph with the following processers and resources, the system consists of four processers P1, P2, P3, and P4 and five resources R1, R2, R3, R4, and R5.

  Intermediate level tasks

Intermediate Level Tasks :  Below is a simple program. It creates 2 threads. The first thread keeps printing out X on the screen, and the second thread keeps printing out O on the screen.

  Role of a database management system

Discuss the role of a database management system (DBMS) and what are its benefits and how does a relational database management system differ from a flat document?

  Globalization effect on culture

There is a host of sociological and cultural analysis that paints a robust picture of the effects of globalization on culture.

  Identify the costs associated with security requirement

A year after your 1st visit to credit union the manager calls you once again. His business is experiencing tremendous growth and requires to either open another branch office.

  Open systems interconnection model

Discuss the drawbacks and benefits of each of these standards, OSI/CMIP, SNMP/Internet, and TMN. Give any enhancements to these standards.

  Explanation of it networks

While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.

  Mobile email and text messaging in the work place

What is a firm's fully qualified domain name and what is the significance of the. Discuss the benefits and drawbacks of mobile email and text messaging in the work place.

  Computing effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of the remaining, 10 percent (or 2 percent of the total) cause page faults.What is the effective memory access time?

  As computers have evolved the complexity of operating

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd