two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Advantage of software life cycle model, Q. Advantage of software life cycle...

Q. Advantage of software life cycle model? The advantage of this model is the wide range of options to accommodate the good features of outer life cycle models. It becomes equi

What is security testing, What is security testing? Security testing at...

What is security testing? Security testing attempts to determine that protection mechanism built into a system will protect it from improper penetration.

Software licesnse, what are the main characteristics of software lease

what are the main characteristics of software lease

what is qualification testing, Formal testing, usually conducted by the de...

Formal testing, usually conducted by the developer for the consumer, to demonstrate that the software meet its described requirements.

How the case tools are classified, How the CASE tools are classified? C...

How the CASE tools are classified? CASE tools can be classified by A. By function or use B. By user type(e.g. manager,tester),or C. By stage in software engineering pr

System analyst, Explain the role and functions of a Systems Analyst in the ...

Explain the role and functions of a Systems Analyst in the overall project development.

Explain acceptance testing and beta testing, Q. Explain acceptance testing ...

Q. Explain acceptance testing and beta testing? Acceptance Testing as well as Beta testing: System tests are designed to authenticate a fully developed system to guarantee th

What is parallel testing, Testing a new or an changed data processing syste...

Testing a new or an changed data processing system with the similar source data that is used in another system. The other system is taken as the standard of comparison.

What is constant, What is Constant? In software or software testing, a c...

What is Constant? In software or software testing, a constant is a meaningful name that shown a number, or string, that does not alter. Constants are variables that remain the s

Assumptions of the execution-time component model, What are the assumptions...

What are the assumptions of the execution-time component model? The execution-time component is based on the several assumptions: (1) Tests show the environment in which the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd