two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Why is quality assurance difficult in software engineering, Question: (...

Question: (a) Why is quality assurance especially difficult in software engineering ? (b) Inspiring yourself from the McCall's taxonomy of quality attributes, explain five

Ftr, EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING...

EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING

Dfd, online admision application

online admision application

Define object in software engineering, Q. Define Object in Software Enginee...

Q. Define Object in Software Engineering? Object:- An object is something which is capable of being seen, touched or sensed. Each object has certain distinctions or attributes

Explain the design steps of the transform mapping, Explain the design steps...

Explain the design steps of the transform mapping. Review the fundamental model. Review and refine the DFD for the software. Verify whether the DFD has the transf

Define the failure intensity of the basic model, Q Define the failure inten...

Q Define the failure intensity of the Basic model? Ans: The failure intensity of the Basic model is λ (μ) = λ 0 [1 - μ / v 0 ] Where λ 0 is the initial failure inten

What do you mean by configuration management, Q. What do you mean by Config...

Q. What do you mean by Configuration Management? Because of several reasons software changes during its life cycle. Consequently of the change made multiple versions of the sof

Explain predictive validity, Q. Explain Predictive validity? Predictiv...

Q. Explain Predictive validity? Predictive validity: It is the potential of the model to predict future failure behaviour from present and past failure behaviour. This capabi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd