two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

what is qualification testing, Formal testing, usually conducted by the de...

Formal testing, usually conducted by the developer for the consumer, to demonstrate that the software meet its described requirements.

Software restructuring, Software restructuring Software restructuring c...

Software restructuring Software restructuring changes source code and / or data an effort to make it amenable to future changes. In general, restructuring does not change the o

Structural partitioning, compare and contrast the advantages of verticle an...

compare and contrast the advantages of verticle and horizontal structural partitioning?

Encryption-decryption algorithms and aes, Introduction The goal of the ...

Introduction The goal of the assignment is to build functionality on top of twitter that allows you to encrypt tweets to subgroups of your twitter Background Material R

Explain equivalent size measure software metrics, Q. Explain Equivalent siz...

Q. Explain Equivalent size measure software metrics? Equivalent size measure:- Models makes no distinction between a new software and the portion being reused. The equivalent

What is configuration management, What is configuration Management? Sof...

What is configuration Management? Software Configuration management (SCM) is the task of tracking and controlling alters in the software. Configuration management practices con

Few projects suggestion, Can you please suggest sample project works relate...

Can you please suggest sample project works related to advanced software engineering?

What is software configuration management, What is Software configuration m...

What is Software configuration management? ans)Software Configuration Management (SCM) is the control and the recording of alter that are made to the software and documentation

What is variable trace, 1. "Variable trace" is a (computer) record of the n...

1. "Variable trace" is a (computer) record of the names and the values of variables accessed and/or changed during the implementation of a computer program. 2. "Value trace" is

Define software testing, Define software testing. Software testing is a...

Define software testing. Software testing is a process used to help recognize the correctness, completeness and superiority of developed computer software. With that in mind, t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd