two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

What is Regression testing, Regression testing:- It is the re-execution ...

Regression testing:- It is the re-execution of some subset of tests that have already been conducted to make sure the changes that have not been propagated unintended side e

Pl sql, The company wants to offer an incentive of free shipping to those c...

The company wants to offer an incentive of free shipping to those customers who have not returned for two months. Create a procedure named PROMO_SHIP_SP that determines who these c

Define the procedural abstraction, State Procedural abstraction. A Pro...

State Procedural abstraction. A Procedural abstraction is a named series of commands that has a specific and limited function. Eg: Open Walk to the door, reach out & grasp

Explain the boundary value analysis, What is Boundary value Analysis? ...

What is Boundary value Analysis? Boundary value analysis is a method in software testing where tests are designed for showing boundary values. The values will be on the edge of

Business intelligence, What are the advantages and disadvantages of using a...

What are the advantages and disadvantages of using a Business Intelligence (BI) software system in a small/medium level business?

What is user documentation, "User documentation" is a document that explain...

"User documentation" is a document that explains the way a software product or system should be used to get the desired results.

Library housekeeping software, Library Housekeeping Software: The mark...

Library Housekeeping Software: The market is flooded with a variety of packages specially designed to support library housekeeping operations such as acquisitions, cataloguing

Implicit and an explicit conceptual model, What is the difference among an ...

What is the difference among an implicit and an explicit conceptual model?

What is regression testing, What is regression testing? Regression test...

What is regression testing? Regression testing is the re-execution of some subject texts that have already been conducted to make sure that changes have not propagated unintend

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd