about execution cycle, Basic Computer Science

Assignment Help:
One time a program is in memory it has to be executed. To do this, each instruction must be appeared at, decoded and acted upon in turn until the program is finished. This is accomplished by the use of what is termed the ''instruction execution cycle'', which is the cycle by which each instruction in revolve is processed. However, to make sure that the execution proceeds easily, it is also necessary to synchronize the activities of the processor.
To go on the events synchronized, the clock located within the CPU control unit is used. This creates regular pulses on the system bus at a specific frequency, so that each pulse is an equal time subsequent the last. This clock pulse frequency is related to the clock rate of the processor - the higher the clock speed, the shorter the time between pulses. Actions only take place when a pulse is detected, so that commands can be kept in time with each other across the entire computer unit.
The instruction execution cycle can be undoubtedly divided into three different components, which will now be appeared at in more detail.
Fetch Cycle
The fetch cycle gets the address required from memory, stores it in the instruction register, and moves the program counter on one so that it points to the next instruction.
Decode Cycle
in it, the control unit ensures the instruction that is now stored within the instruction register. It concludes which opcode and addressing mode have been used, and as such what actions need to be carried out so as to execute the instruction in question.
Execute Cycle
the definite actions which occur during the execute cycle of an instruction depend on both the instruction itself, and the addressing mode specified to be used to access the data that may be involved. Though, four main groups of actions do exist, which are discussed in full later on.

Related Discussions:- about execution cycle

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Software engineering, assignment 1:architectural design 2: component des...

assignment 1:architectural design 2: component design

Unix, How do I change file permissions? Every time I execute chmod commands...

How do I change file permissions? Every time I execute chmod commands it tells me permission denied.

Characterizations of artificial intelligence, Characterizations of Artifici...

Characterizations of Artificial Intelligence Artificial Intelligence is a typical science to describe, because it has fuzzy borders with, psychology, computer science, mathemat

7489 ttl ram device, The 7489 TTL Ram Device: The 7489 TTL Ram package ...

The 7489 TTL Ram Device: The 7489 TTL Ram package has 64 memory cells, each cell is capable of holding a single bit of data.  The cells are organised into locations, and each l

Find job, I want assignment writingjob

I want assignment writingjob

Memory management, Memory Management: The purpose of the memory mana...

Memory Management: The purpose of the memory management system is to load programs into memory in such a way as to give each program loaded  the memory that it requires for

Impact printers and non - impact printers, Impact Printers and non - Impact...

Impact Printers and non - Impact Printers: Impact Printers: These are printers in which the print-head strikes a ribbon, and include the daisywheel and thimble printer

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd