two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Software development, SOFTWARE DEVELOPMENT: Software development is a ...

SOFTWARE DEVELOPMENT: Software development is a human activity. It involves a clear understanding of the field of application, such as library and information science; knowled

What is data integrity, What is Data integrity? Ans) Data integrity is o...

What is Data integrity? Ans) Data integrity is one of the six fundamental components of information security. Data integrity is the soundness, completeness and wholeness of the

How does the risk factor affect the spiral model, Q. How does the risk fact...

Q. How does the risk factor affect the spiral model of software development? Ans: Risk Analysis phase is the most vital part of Spiral Model. In this phase all probable (and

Analysis and design techniques - unified modeling language, Case Study: ...

Case Study: LHM is a London based privately owned hospital which provides healthcare to its patients.  The hospital uses in-house software to manage and service its patients whi

What specific languages can be used in srs, What specific languages can be ...

What specific languages can be used in SRS? Requirement specification necessitates the use of some order language. The language should support the desired qualities of the SRS-

Task set, task set for a project plan

task set for a project plan

Explain about total quality management, Q. Explain about Total Quality Mana...

Q. Explain about Total Quality Management? TQM is a part of management practices throughout the organization, geared to make sure the organization consistently exceeds or meets

What is boundary value testing, A testing technique using input values at, ...

A testing technique using input values at, just below, and just above, the definite limits of an input domain; and with input values causing outputs to be at, just below, and just

Software availability, Software Availability: In the present day conte...

Software Availability: In the present day context, software suppliers have realised the potential demand and also the special requirements of library and information professio

Test a system though there is no documentation available, You need to test ...

You need to test a system though there is no documentation available and developers who developed it don't work there anymore. What would you do? - We will perform exploratory

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd