two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Explain the activities of software maintenance, The activities of software ...

The activities of software maintenance Software maintenance is a broad activity that contains error correction, increasing of capabilities, deletion of obsolete capabilities an

Define capability maturity model, CMM is a strategy for enhancing the softw...

CMM is a strategy for enhancing the software process irrespective of the actual life cycle model utilized. SEI (Software Engineering Institute) of Carnegie-Mellon University develo

Applied physics, an isolated metal sphere has a radius r. when charged to a...

an isolated metal sphere has a radius r. when charged to a potential v, the charge on sphere is q. 1- state an expression, in terms of r and q, for potential v of sphere.

Explain error, A discrepancy among a computed, observed, or calculated valu...

A discrepancy among a computed, observed, or calculated value or condition and the true, specified, or theoretically correct value or condition; and

Making, How can we make a software

How can we make a software

Write short note on black box testing, Write short note on black box testin...

Write short note on black box testing. The black box testing is also known as behavioural testing. This method fully focuses on the functional needs of the software. Tests are

What is verification, What is verification?     Verification is the pro...

What is verification?     Verification is the process of determining whether the output of single phase of software development conforms to that of its last phase, whereas vali

Define software scope, Define software scope. The first software projec...

Define software scope. The first software project management activity is the determination of software scope. Scope is explained answering the following questions. Context:

What is cardinality in data modeling, What is cardinality in data modeling?...

What is cardinality in data modeling? Cardinality in data modeling, cardinality specifies how the number of occurrences of single object is related to the number of occurrences

Artificial intellegence, can yo do a project on Artificial Intelligence.The...

can yo do a project on Artificial Intelligence.The topic is L-system of flowers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd