How many bits are needed for the opcode

Assignment Help Computer Engineering
Reference no: EM131167951

A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.

a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?

Reference no: EM131167951

Questions Cloud

How many bits are required to address a 1m eight main memory : How many bits are required to address a 1M 8 main memory if Main memory is byte-addressable and Main memory is word-addressable?
Find the correlation between the residuals and fitted values : find the correlation between the residuals and fitted values to be 0.829. - Does this provide a good indication that the estimated regression equation is satisfactory? Explain why or why not.
Explain how the characteristic grade : A school is studying their students' test scores by grade. Explain how the characteristic "grade" could be considered either a categorical or a numerical variable.
How many ram chips are there per memory word : How many RAM chips are necessary? How many RAM chips are there per memory word? How many address bits are needed for each RAM chip? How many banks will this memory have? How many address bits are needed for all of memory?
How many bits are needed for the opcode : How many bits are needed for the opcode? How many bits are left for the address part of the instruction? What is the maximum allowable size for memory?
Dependent variable and two potential explanatory variables : investigate the relationship between a dependent variable Y and two potential explanatory variables X1 and X2.
What are the lowest and highest addresses : What are the lowest and highest addresses if memory is byte-addressable? What are the lowest and highest addresses if memory is word-addressable, assuming a 16-bit word?
Dependent measure into the dependent variable window : i. Analyze→General Linear Model→Univariate ii. Move your dependent measure into the Dependent Variable window. iii. Move your independent variables into the Fixed Factor(s) window.
Discuss the legal influences on judicial decisions : Discuss the legal influences on judicial decisions, including the Constitution, the facts of the case, legal precedent, and statutory and administrative law

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd