two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Software design improve when we use object-oriented concept, Why does the ...

Why does the software design improve when  we use object-oriented concepts?    The software design improves when we use object-oriented concepts because 1. Object-orientatio

Define cyclomatic complexity, Define Cyclomatic complexity Cyclomatic ...

Define Cyclomatic complexity Cyclomatic complexity :- This is a measure of the control complexity of a program. This control complexity may be connected to program understanda

What are the functions of data architecture, What are the functions of data...

What are the functions of data architecture? It gives the information needed for a business function. Recognize the data objects and their relationship. Eg: Custome

Data dictionary, data dictionary on library management system

data dictionary on library management system

Give the procedure of the delphi method, Give the procedure of the Delphi m...

Give the procedure of the Delphi method. 1. The co-ordinator shows a specification and estimation form to each expert. 2. Co-ordinator calls a group meeting in which the exp

What is branch coverage testing, A test method satisfying coverage criteria...

A test method satisfying coverage criteria that needs each decision point at every possible branch to be implemented at least once.

What are the important points to do software design, What are the important...

What are the important points to do software design The below points must be kept in mind when performing the design:  i) Practicality: This ensures that system is stable

What is recovery testing and security testing, What is recovery testing and...

What is recovery testing and Security testing  Recovery testing is system tests that bind the software to fail in a variety of ways and justify that recovery is correctly perf

What is non-intrusive testing, What is Non-intrusive Testing? Testing th...

What is Non-intrusive Testing? Testing that is transparent to the software under test; i.e., testing that does not alter the timing or processing characteristics of the software

What is a real time system, What is a Real time system? Real time syste...

What is a Real time system? Real time system is a software system in which the correct functionalities of the system are dependent upon results formed by the system and the tim

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd