about execution cycle, Basic Computer Science

Assignment Help:
One time a program is in memory it has to be executed. To do this, each instruction must be appeared at, decoded and acted upon in turn until the program is finished. This is accomplished by the use of what is termed the ''instruction execution cycle'', which is the cycle by which each instruction in revolve is processed. However, to make sure that the execution proceeds easily, it is also necessary to synchronize the activities of the processor.
To go on the events synchronized, the clock located within the CPU control unit is used. This creates regular pulses on the system bus at a specific frequency, so that each pulse is an equal time subsequent the last. This clock pulse frequency is related to the clock rate of the processor - the higher the clock speed, the shorter the time between pulses. Actions only take place when a pulse is detected, so that commands can be kept in time with each other across the entire computer unit.
The instruction execution cycle can be undoubtedly divided into three different components, which will now be appeared at in more detail.
Fetch Cycle
The fetch cycle gets the address required from memory, stores it in the instruction register, and moves the program counter on one so that it points to the next instruction.
Decode Cycle
in it, the control unit ensures the instruction that is now stored within the instruction register. It concludes which opcode and addressing mode have been used, and as such what actions need to be carried out so as to execute the instruction in question.
Execute Cycle
the definite actions which occur during the execute cycle of an instruction depend on both the instruction itself, and the addressing mode specified to be used to access the data that may be involved. Though, four main groups of actions do exist, which are discussed in full later on.

Related Discussions:- about execution cycle

The gigo principle, The GIGO Principle : This is a simple principle with a...

The GIGO Principle : This is a simple principle with a clear message and universal application - Garbage In - Garbage out! Always try and enter any data in the form you want to

What are the three basic security provided by ssl, QUESTION (a) Can SSL...

QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati

What is microcontroller?, Microcontroller: A highly integrated microprocess...

Microcontroller: A highly integrated microprocessor designed specifically for use in embedded systems. Microcontrollers typically includes an integrated CPU, memory (a small amount

Digital electronic, draw the logic diagram of 2*4 decoder in only NOR gate ...

draw the logic diagram of 2*4 decoder in only NOR gate .include enable inputs .

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Designing computer based information systems-background, DESIGNING COMPUTER...

DESIGNING COMPUTER BASED INFORMATION SYSTEMS Background The role of Management Information Systems (MIS) in an organization can be considered as providing

ICT, what are the significance of telecommunications deregulation

what are the significance of telecommunications deregulation

Defining conditional operator, Problem 1 What is conditional operator? ...

Problem 1 What is conditional operator? Using conditional operator find a smallest number between two numbers Defining conditional operator Using it to find smallest n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd