about execution cycle, Basic Computer Science

Assignment Help:
One time a program is in memory it has to be executed. To do this, each instruction must be appeared at, decoded and acted upon in turn until the program is finished. This is accomplished by the use of what is termed the ''instruction execution cycle'', which is the cycle by which each instruction in revolve is processed. However, to make sure that the execution proceeds easily, it is also necessary to synchronize the activities of the processor.
To go on the events synchronized, the clock located within the CPU control unit is used. This creates regular pulses on the system bus at a specific frequency, so that each pulse is an equal time subsequent the last. This clock pulse frequency is related to the clock rate of the processor - the higher the clock speed, the shorter the time between pulses. Actions only take place when a pulse is detected, so that commands can be kept in time with each other across the entire computer unit.
The instruction execution cycle can be undoubtedly divided into three different components, which will now be appeared at in more detail.
Fetch Cycle
The fetch cycle gets the address required from memory, stores it in the instruction register, and moves the program counter on one so that it points to the next instruction.
Decode Cycle
in it, the control unit ensures the instruction that is now stored within the instruction register. It concludes which opcode and addressing mode have been used, and as such what actions need to be carried out so as to execute the instruction in question.
Execute Cycle
the definite actions which occur during the execute cycle of an instruction depend on both the instruction itself, and the addressing mode specified to be used to access the data that may be involved. Though, four main groups of actions do exist, which are discussed in full later on.

Related Discussions:- about execution cycle

Definition of resource sharing , Resource sharing is a concept which has de...

Resource sharing is a concept which has developed to contain many cooperative activities among libraries and other stakeholders. Interlibrary loan continues to be the basis of reso

Computer system architecture, 1. Suppose that the meaning of the BUN instru...

1. Suppose that the meaning of the BUN instruction of the Basic Computer is changed to implement the relative addressing mode, i.e PC a) Write an optimal operation sequence to im

Assembly Language Project, Our instructor gave us a project in making a mec...

Our instructor gave us a project in making a mechanical game or simple device using assembly language, can anyone give me a an example of a project description for our proposal?

Turn-around, The term ‘page traffic’ describes

The term ‘page traffic’ describes

Outdoor patient department features - a patient registry, A Patient Regist...

A Patient Registry Name, Surname and Address  Sex  Caste  Contact Numbers  Area (Rural/Urban/Suburban)  City/District  State  General Examination deta

Pyhon''s Multi-Line Statements , Statements in Python classically end with ...

Statements in Python classically end with a new line. Python does, though, permit the use of the line continuation character (\) to denote that the line should continue. Illustrati

Constant , Constant: In contrast to a variable, which is used as ident...

Constant: In contrast to a variable, which is used as identifier for a value and which can change, constants are identifiers that are used for values, which cannot be changed.

Hacking, how can i hack a server

how can i hack a server

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd