two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

What are the umbrella activities of a software process, What are the umbrel...

What are the umbrella activities of a software process? Software project tracking and control. Risk management. Software Quality Assurance. Formal Technical Reviews.

Describe the various types of restructuring techniques, Q.  Describe the v...

Q.  Describe the various types of restructuring techniques? Ans. Software restructuring modifies source code as well as data an effort to make it amenable to future changes

Define the design phase of SDLC, Define the Design phase of SDLC In th...

Define the Design phase of SDLC In this stage, a logical system is built which fulfils given requirements. Design phase of software development deals with transforming custome

Explain boundary value analysis, A selection method in which test data are ...

A selection method in which test data are chosen to lie along "boundaries" of the input domain [or output range] classes, data structures, procedure parameters, etc. Choices often

FTR., Formal technical review in railway reservation system

Formal technical review in railway reservation system

Explain re-engineering, RE-ENGINEERING:- It is re-organizing and changing ...

RE-ENGINEERING:- It is re-organizing and changing existing system to make them more maintainable. It includes:-  Source code translation. Program structure development

Define repeated inheritance, Repeated inheritance If a class inherits ...

Repeated inheritance If a class inherits more than once from the same class then it is referred to as repeated inheritance.

Write definition of erd, Write definition of ERD? Entity Relationship D...

Write definition of ERD? Entity Relationship Diagram shows the graphical presentation of the object relationship pair. It is above all used in database applications.

How to compute the cyclomatic complexity, How to compute the cyclomatic com...

How to compute the cyclomatic complexity? The cyclomatic complexity can be computed by any one of the following ways. 1. The numbers of regions of the flow graph correspond

Implementing an erp system at hawkins cookers ltd, Question : (a) What ...

Question : (a) What are the main characteristics of an ERP system? List the benefits and disadvantages of implementing an ERP system at Hawkins Cookers Ltd. (b) Explain the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd