two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Define in brief about the silktest agent, Define in brief about the SilkTes...

Define in brief about the SilkTest Agent SilkTest component which receives testing commands from SilkTest Host and interacts with AUT (Application under Test) directly. SilkT

What is path coverage testing, What is Path Coverage Testing? Ans) A tes...

What is Path Coverage Testing? Ans) A test process satisfying coverage criteria that every logical path by the program is tested. Paths through the program often are grouped int

Explain configuration management, Configuration management (CM) covers the ...

Configuration management (CM) covers the tools and procedure used to control, coordinate and track code, needs, documentation, problems, change requests, designs, tools, compilers,

What is verification, What is verification?     Verification is the pro...

What is verification?     Verification is the process of determining whether the output of single phase of software development conforms to that of its last phase, whereas vali

Advanced software engineering, Is there ever a case when the generic activi...

Is there ever a case when the generic activities of the software engineering process don’t apply?

What is the full form of eva, What is EVA? Earned Value Analysis is a ...

What is EVA? Earned Value Analysis is a technique of performing quantitative analysis of the software project. It gives a common value scale for each task of software projec

Explain equivalent size measure software metrics, Q. Explain Equivalent siz...

Q. Explain Equivalent size measure software metrics? Equivalent size measure:- Models makes no distinction between a new software and the portion being reused. The equivalent

Functional requirement for a library management system, Write down the func...

Write down the functional requirement for a Library management system. The user should capable to search either all of the primary set of databases or select a subset of dat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd