two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Ms project, what is meant by gantt chart who gave the name who is the found...

what is meant by gantt chart who gave the name who is the founder

Differentiate between iso and cmm, Q. Differentiate between ISO and CMM? ...

Q. Differentiate between ISO and CMM? Ans) The difference between CMM and ISO are as follows :- - ISO 9000 is awarded by an international standards body. Thus, ISO 9000 cert

Name the design phase of SDLC, Name the design phase of SDLC Generally,...

Name the design phase of SDLC Generally, design is performed in the below two steps: i)  Primary Design Phase: In this phase, system is designed at block level. Blocks are

How print statements used in software testing, Q. How Print statements used...

Q. How Print statements used in Software testing? Print statements:-The standard print statement in the language being utilized is sprinkled throughout the program to output va

What is dma data transfer, DMA data transfer The position of the DMA co...

DMA data transfer The position of the DMA controller between the other components in a computer system. The CPU communicates with the DMA by the  address and data buses as with

#title.decision table, You are to create a decision table to help you decid...

You are to create a decision table to help you decide what to do for the day. If it is a weekday and it is not a holiday, then you go to work. However, if it is a weekday and it

What is risk assessment, What is Risk Assessment? Ans) A associated impa...

What is Risk Assessment? Ans) A associated impact and its comprehensive evaluation of the risk

What is system simulation, What is System Simulation? Normal 0 ...

What is System Simulation? Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Advantage of software package, Advantage of software package: Advantag...

Advantage of software package: Advantages accrue from this situation. Some of these are mentioned below:  i)  An efficient software package requires at least 4 to 5 man yea

Explain token count, Token count: -  A program is considered to be series o...

Token count: -  A program is considered to be series of tokens and if we count the number of tokens, some interesting results might be emerge. Tokens are classified as either opera

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd