two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Incremental model, four circumstances where incremental model is appropriat...

four circumstances where incremental model is appropriate?

What are command buttons, What are command buttons? How to use command butt...

What are command buttons? How to use command buttons? Command buttons are defines to as controls. The control is capable of implementing a set of instruction when the user clic

SRS, What are the advantage and disadvantage of SRS?

What are the advantage and disadvantage of SRS?

Give the overview of application software, Question 1 Give the classificat...

Question 1 Give the classification of computers and explain them briefly Question 2 Give the overview of application software Question 3 Explain the three main types of

Allocate operations to the entity life history diagram, QUESTION 1 (a) ...

QUESTION 1 (a) Suggest how the atomicity of EV1 "Request for estimate" could be improved (b) Document any five events listed above (Tip: state the actor, system agent, input

K-map, m2+m3+m5+m7+m12+m8+m9 simplify using k-map

m2+m3+m5+m7+m12+m8+m9 simplify using k-map

Illustrate about the waterfall model, Waterfall Model It is the oldest...

Waterfall Model It is the oldest, simplest and most widely used process model. In waterfall model, every phase of the life cycle is finished before start of a new phase. It's

What is software fault, Software faults are unseen programming errors. Soft...

Software faults are unseen programming errors. Software faults are errors in the correctness of the semantics of computer programs.

What does data dictionary contains, What does data dictionary contains? ...

What does data dictionary contains? Name: The primary name of the data. Alias: other names used Where-used/How-used: A record of processes that use the data or control it

What are the reasons behind to perform white box testing, What are the reas...

What are the reasons behind to perform white box testing? There are three major reasons behind performing the white box testing. 1. Programmers may have some incorrect assum

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd