two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Explain test archiving systems, Q. Explain Test archiving systems? Tes...

Q. Explain Test archiving systems? Test archiving systems: the goal is to keep follow of series of tests ant to act as the basis for documenting that the tests have been done

Some important steps while doing testing, Some Important Steps while doing ...

Some Important Steps while doing performing testing The below objectives are to be kept in mind when performing testing: i)  It should be done with the intention of finding

What is system engineering, What is System Engineering? System Engineer...

What is System Engineering? System Engineering means designing, executing, deploying and operating systems which contain hardware, software and people.

Determine the test cases using boundary value analysis, Q. Consider a progr...

Q. Consider a program which computes the square root of an input integer between 0 and 5000. Determine the equivalence class test cases. Determine the test cases using boundary val

What is boundary value, Explain Boundary value? (1)A data value that cor...

Explain Boundary value? (1)A data value that corresponds to a input, internal, or output value specified for a system or component. (2) A value which lies at, or just inside

What is security testing, What is security testing? Security testing at...

What is security testing? Security testing attempts to determine that protection mechanism built into a system will protect it from improper penetration.

What is interface analysis, Checks the interfaces among program elements fo...

Checks the interfaces among program elements for consistency and adherence to predefined axioms or rules.

Explain effort adjustment factor, Q. Explain effort adjustment factor? ...

Q. Explain effort adjustment factor? All of the 15 attributes receives a rating on a six-point scale that ranges from very low to extra high (in importance or value). An endeav

What is interface testing, Testing conducted to evaluate whether systems or...

Testing conducted to evaluate whether systems or components pass data and control correctly to one another. Contrast with testing, unit; testing, system. Normal 0

Explain scalability of information systems, Question: (a) The relations...

Question: (a) The relationship between organisations and information technology is a complex one, and is made up of a number of mediating factors which must be considered prior

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd