Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Code Density and Smaller Faster Programs?
Memory was very expensive in older computer. So there was a need of less memory utilization, which is it was cost effective to have smaller compact programs. So it was opined that instruction set must be more complex so that programs are smaller. But increased complexity of instruction sets had resulted ininstruction sets and addressing modes needing more bits to represent them. It is said that code compaction is significanthowever cost of 10 percent more memory is often far less than cost of reducing code by 10 percent out of CPU architecture innovations.
Smaller programs are beneficialsince they need smaller RAM space. Though today memory is very cheap and this potential benefit today isn't so compelling. More significant small programs must enhance performance. How? Fewer instructions mean fewer instruction bytes to be fetched.
Though problem with this reasoning is that it isn't certain that a CISC program will be smaller than corresponding RISC program. In several cases CISC program represented in symbolic machine language may be smaller however the number of bits of machine code program might not be noticeably smaller. This might result from reason that in RISC we employ register addressing and less instruction that require fewer bits in general. Additionally the compilers on CISCs frequently favour simpler instructions so that conciseness of complex instruction rarely comes into play.
formation of bond etc
Q. Explain about Interrupt Procedure? The interrupt procedure uses request header to conclude the function requested by DOS. It also performs all functions for device driver. T
Q. Define the Bandwidth of a monitor? Bandwidth is the amount of signal the monitor can handle and it is rated in MHz .This is the most usually quoted specification of a monito
The method for updating the main memory as soon as a word is removed from the Cache is known as (A) Write-through (B) write-back (C) protected write
Briefly explain how server form post-back works? Post Back: The process in which a Web page sends data back to the similar page on the server. View State: View State is the m
Determine Symbolic names can be associated with Symbolic names can be associated with the data or instruction
Q. What are intelligent agents? What tasks will they perform? ANSWER: Intelligent agents are software that helps you, or operate on your behalf, in performing repetitive comput
Define Cloud Computing with example. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., se
Conversion of decimal number 25.5 into binary number Ans. There is integer part is 25 and fractional part is 0.5. Firstly convert the integer part 25 in its equal to binary numb
Q. Show the ranges of Port numbers? Port numbers are divided into three ranges: Well-known ports are those from 0 through 1,023. Registered ports are those from
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd