two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

What is cycle stealing dma operation, What is cycle stealing DMA operation?...

What is cycle stealing DMA operation? Cycle Stealing: In this process, the DMA controller transfers one data word at a time, after which it must return control of the buses to

What is maintenance, Define maintenance. Maintenance is defined as the ...

Define maintenance. Maintenance is defined as the procedure in which changes are executed by either modifying the existing system's architecture or by adding new mechanism to t

What are the two levels of testing, What are the two levels of testing? ...

What are the two levels of testing? i. Component testing Individual components are tested. Tests are derived from developer' s experience. ii. System Testing The group

What are the fundamental activities of a software process, What are the fun...

What are the fundamental activities of a software process?   Specification  Design and implementation Validation Evolution

List flaws in waterfall model, List flaws in waterfall model. - The big...

List flaws in waterfall model. - The biggest drawback is that you don't test the application logic until very late in development cycle. - Though a detailed system specifica

Explain critical design review, Explain critical design review The purp...

Explain critical design review The purpose of critical design review is to make sure that the detailed design satisfies the specifications laid down during system design. The

Layered software architecture, iii. Layered software architectures can be ...

iii. Layered software architectures can be used to reduce coupling between the functions of a system that are closer to the machine and those that are closer to user needs. Why is

What is test log, What is Test log? A chronological record of all releva...

What is Test log? A chronological record of all relevant details about the implementation of a test.

What is parallel/audit testing, Parallel/audit testing is testing where the...

Parallel/audit testing is testing where the user reconciles the output of the latest system to the output of the present system to determine the new system performs the operations

Configuration management, Configuration Management: Because of several ...

Configuration Management: Because of several reasons, software changes during its life cycle. As a result of the changes made, many versions of the software exist at one time.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd