two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

The majority charge carriers in p-type semiconductor, The majority charge c...

The majority charge carriers in p-type semiconductor are?? The majority charge carriers are  holes.

Explain in detail about the real time systems, Explain in detail about the ...

Explain in detail about the real time systems. Hard and soft real time systems. Real time and high performance. Real-Time control. Real time software design P

State both verification and validation, Define Verification &Validation. ...

Define Verification &Validation. Verification : The set of actions that make sure software correctly implements a particular function. Validation : The set of actions that

Discuss in detail about delphi method, Discuss in detail about Delphi Metho...

Discuss in detail about Delphi Method. Procedure The co-ordinator represents a specification and assessment form to each expert. Co-ordinator calls a group discussion

Network Technology, How can you create a file named -i? Which techniques do...

How can you create a file named -i? Which techniques do not work, and why do they not work? How can you remove the file named -i?

Characteristics of an embedded system, Question: a) Draw a diagram show...

Question: a) Draw a diagram showing the parts of an embedded system. b) Give the definition of an Embedded Computer. c) Discuss the similarities and differences between a

The advantages of using these specific languages of srs, What are the advan...

What are the advantages of using these specific languages of SRS?      The major benefit of using a natural language is that both client and superior understand the language. T

Pert chart, Well establish garment factory (large scale- one of country big...

Well establish garment factory (large scale- one of country biggest) received order of 40,000 fabric to complete within 12 weeks. (This is well profitable order which cannot be ign

Define equivalence partitioning, What is equivalence partitioning? Equi...

What is equivalence partitioning? Equivalence partitioning is a black box method that separates the input domain into classes of data. From this data test cases can be derived.

What is requirement traceability, What is Requirement Traceability? Explain...

What is Requirement Traceability? Explain its importance. Requirement Traceability is mapping of needs to test cases. There are two major traceability: Forward and Backward. It

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd