two fetch-execute cycles, Software Engineering

Assignment Help:

Consider an 8-bit system with 32 memory locations (numbered from 0 to 31) and 8 different instructions. Assume op code for "Load Accumulator" instruction is 510 and for "Add" instruction is 210. At this moment, the program counter register PC contains the value 00100 and is about to increment, memory locations contain the following values:   

Address Contents
01101   00110110
01100   01110100
01011   10111000
:
00110   01001100
00101   10101011
00100   01111000

Perform two fetch-execute cycles, present each step of the cycles and the contents of each special-purpose register at the beginning and at the end of each step of the cycles in binary. If you believe there is no information on the contents of a particular register, indicate it as [unknown] (e.g., MDR[unknown]). If overflow occurs, the MSB is stored in a single-bit flag register and not counted in Accumulator. Express the final contents of Accumulator in both binary and decimal. For your answer, use the following table (two first lines are given as sample):

Step

PC

MAR

MDR

IR

A

PC→MAR                beginning

00101

[unknown]

[unknown]

[unknown]

[unknown]

                                          end

00101

00101

[unknown]

[unknown]

[unknown]


Related Discussions:- two fetch-execute cycles

Product engineering- concept, Product engineering is a system engineering ...

Product engineering is a system engineering approach which starts with system analysis. The system engineer identifies  the customer's requirement, determines economic and econ

Explain scm, What is SCM? Software Configuration Management is a set of...

What is SCM? Software Configuration Management is a set of activities carried out for identifying, organizing and controlling alters throughout the lifecycle of computer softwa

What does the insert statement in extract datasets do, What does the insert...

What does the insert statement in extract datasets do? It describes the fields of a field group.

Ftr, EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING...

EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING

Cyclomatic complexity for a data flow diagram, pls explain how to calculate...

pls explain how to calculatethe cyclomatic complexity and independent paths Determine the cyclomatic complexity of the code ( (iii) Identify all the independent paths

What is a boundary value analysis, What is a boundary value analysis? A...

What is a boundary value analysis? A boundary value analysis is a testing method in which the elements at the edge of the domain are selected and tested. It is a test case desi

What does level0 dfd represent, What does Level0 DFD represent? Level0...

What does Level0 DFD represent? Level0 DFD is known as 'fundamental system model' or 'context model'. In the context model the entire software system is shown by a single bubb

State lehmans first law, State Lehman's First law. A program that is u...

State Lehman's First law. A program that is used in true world environment essentially must change or become progressively less useful in that environment.

What is test data generators, Q. What is Test data generators? This is...

Q. What is Test data generators? This is a difficult one as well as at least for the present is one for which no general solution exists. One of the practical problems with te

Explain throw-away prototyping, Throw-away prototyping Objective: ...

Throw-away prototyping Objective: The principal objective of this model is to validate or to derive the system requirements. It is developed to reduce requir

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd