Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Code Density and Smaller Faster Programs?
Memory was very expensive in older computer. So there was a need of less memory utilization, which is it was cost effective to have smaller compact programs. So it was opined that instruction set must be more complex so that programs are smaller. But increased complexity of instruction sets had resulted ininstruction sets and addressing modes needing more bits to represent them. It is said that code compaction is significanthowever cost of 10 percent more memory is often far less than cost of reducing code by 10 percent out of CPU architecture innovations.
Smaller programs are beneficialsince they need smaller RAM space. Though today memory is very cheap and this potential benefit today isn't so compelling. More significant small programs must enhance performance. How? Fewer instructions mean fewer instruction bytes to be fetched.
Though problem with this reasoning is that it isn't certain that a CISC program will be smaller than corresponding RISC program. In several cases CISC program represented in symbolic machine language may be smaller however the number of bits of machine code program might not be noticeably smaller. This might result from reason that in RISC we employ register addressing and less instruction that require fewer bits in general. Additionally the compilers on CISCs frequently favour simpler instructions so that conciseness of complex instruction rarely comes into play.
In the message-passing model, there exists a set of tasks that use their own local memories during computation. Multiple tasks can reside on the similar physical machine as well ac
Forward Chaining: Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal
Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t
Compare electromechanical switching system with electronic switching system. Comparison of electromechanical switching system with electronic switching systemgiven below:
Explain dataflow computation model An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of dat
Explain bit-O-Ring technique. The micro program represents that branches are not always made to a one branch address. This is a direct consequence of combining easy micro routi
Convert the given S-R flipflop to a D-flip flop. Ans: The Truth Table for S-R Flip-Flop is illustrated in Fig.(a) and truth table of D Flip-Flop is illustrated in Fig.(b)
Which datatype cannot be used to define parameters. Type F datatype is not used to explain parameters.
What are the characteristics of the E-Cash? These kinds of payments, turning the Internet within a transaction oriented forum, need mediums which are easy and cheap (through a
Question: a) Describe the structure and function of a computer system. b) The raw speed of a microprocessor will not achieve its potential unless a constant stream of wor
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd