two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

What does modality in data modeling indicates, What does modality in data m...

What does modality in data modeling indicates? Modality shows whether or not a particular data object must participate in the relationship.

Stats free, system architecture block diagram

system architecture block diagram

Distinguish between verification and validation, Distinguish between verifi...

Distinguish between verification and validation. Verification refers to the set of activities that make sure that software correctly executes a specific function. Validation re

What is error seeding, Define Error seeding? Ans) The process of intenti...

Define Error seeding? Ans) The process of intentionally adding called as faults to those already in a computer program for the purpose of monitoring the rate of recognition and

Use case realization, Develop a domain model for the Case Study. Express yo...

Develop a domain model for the Case Study. Express your model with a class diagram, showing any inheritance and compositional relationships. For each of the two selected most es

Discuss in details the design steps in transaction mapping, Discuss in deta...

Discuss in details the design steps in transaction mapping. Re-Check the fundamental model. Re-check and refine the DFD for the software. Determine the DFD has either

State about the elementary modeling techniques, State about the Elementary ...

State about the Elementary Modeling Techniques A model illustrating bare minimum requirements is known as Essential Model. It has two components: a) Environmental model B)

Describe the various types of restructuring techniques, Describe the variou...

Describe the various types of restructuring techniques. (a) Code Restructuring: It is performed to yield a design that produces the similar function but with higher quality t

Explain the types of software testing, Explain the types of software testin...

Explain the types of software testing. Unit testing Integration testing System testing User-acceptance testing End-to-End testing Exception testing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd