Comparison between motorola processors and intel processors, Computer Engineering

Assignment Help:

Comparison between Motorola processors and INTEL processors:

Intel/AMD processors are really about the same thing.  They run the same software and operate in a very similar manner.  AMD is often less expensive than Intel and depending on what you use a computer for one may be somewhat faster than other.

Motorola has been largely relegated to the 'also-ran' category of microprocessor manufactures since Apple computer stopped using them in favour of the IBM Power PC processor (Apple has since switched to Intel).

Motorola had an excellent 32 bit processor design years before Intel. Also, the design of Motorola 68000 processor line (from a programmer's perspective) was immensely better.  The two main features of 68000 line that made this true were 

1) Orthogonality of register access and 

2) Number of registers available.  

These aspects made writing code for Motorola CPUs much simpler.

 


Related Discussions:- Comparison between motorola processors and intel processors

How can system improved when free lines are available, How can system impro...

How can system improved if one arrive at the probability of availability of free lines during the busy hour? Improvement can be made when the system is act as a loss system in

How to increase simulation speed, How to increase simulation speed     ...

How to increase simulation speed     First figure out what is eating away your CPU cycles. Is it 1. Compile time - Use a Make file to compile only files with changes and not

Explain the quantization error of an ADC, Explain the Quantization error...

Explain the Quantization error of an ADC. Ans. Quantization error- An analog voltage is within the range of 0 to 1V and for 3 bit output, the size of all intervals are

Explain about the public key cryptography, Explain about the Public Key Cry...

Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private

Functions of header files ctype.h and string.h, What are the functions of ...

What are the functions of the following header files:  (i)  ctype.h (ii)  string.h   (i)   ctype.h: It is a header file that having character tes

Sem 4, Which are the subject of sem 4?

Which are the subject of sem 4?

Factors of information system which affect the business, Q. Factors of Info...

Q. Factors of Information system which affect the business? There are several factors which affect the business such as - a) Threats of fresh entrants. b) Rivalry surro

What is the use of the statement leave to list-processing, What is the use ...

What is the use of the statement Leave to List-processing? Leave to List-processing statement is used to make a list from a module pool.  Leave to list processing statement per

Difference between top-down and bottom-up programming, What is the differen...

What is the difference between top-down and bottom-up, programming? Ans: Top-down and Bottom-up Approaches In Top-down programming approach, we begin by identifying the main

Data phases - computer architecture, Data phases: After the address ph...

Data phases: After the address phase (particularly, starting with the cycle that DEVSEL# goes low) comes a burst of one or more data phases. In all the cases, initiator drives

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd