two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Which type of software must not be automated, Which type of software must n...

Which type of software must not be automated? Following types of software must not be automated: - Incomplete/Unstable software since they are still undergoing changes -

Explain software process, Define software process. Software process is ...

Define software process. Software process is explained as the structured set of activities that are needed to develop the software system.

Explain different recording modes, Explain different recording modes. T...

Explain different recording modes. There are two type of recording modes: context sensitive and analog. - Context Sensitive - identifies GUI objects and records operations

How will you view gui maps in winrunner, How will you view GUI maps in Winr...

How will you view GUI maps in Winrunner? - GUI maps are viewed by using GUI Map Editor - It's located in Tools menu within WinRunner. - It displays all of the GUI Map fil

What is bottom-up strategy, Bottom-up approach, as the name suggests, is th...

Bottom-up approach, as the name suggests, is the differing of the Top-down method. This process begins with building and testing the low level modules first, working its way up

Explain the difference between latent and masked defect, Explain the differ...

Explain the difference between Latent and Masked Defect. Latent Defect is one which has been in the system for a long time; but is discovered now. I.e. A defect which has been

What is test incident report, A document reporting on any event that happen...

A document reporting on any event that happens during testing that needs further investigation.

Database definition - micro cds/isis application, Database Definition: ...

Database Definition: There are four basic steps involved in defining a database. They are:  i)  Creating a Field Definition Table (FDT) : The possible content of data recor

How can manager be used to handle exceptions in QTP, How can recovery scena...

How can recovery scenario manager be used to handle exceptions in QTP? QTP provides a wizard through Recovery Scenario Manger which can recover unexpected errors and events wh

What is the consistency issue raised by state transfer, QUESTION (a) Ex...

QUESTION (a) Explain why making some replica managers read-only may improve the performance of a gossip system. (b) In the gossip architecture, why does a replica manager ne

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd