Convention used to represent micro-operations, Computer Engineering

Assignment Help:

Q. Convention used to represent micro-operations?

The convention used to represent micro-operations is:

1.  Computer register names are designated by capital letters (sometimes followed by numerals) to denote its function. For illustration R1, R2 (General Purpose Registers), AR (Address Register), IR (Instruction Register) etc. 

2. Individual bits within a register are numbered from 0 (rightmost bit) to n-1 (leftmost bit) as shown in Figure below). Common ways of drawing block diagram of a computer register are displayed below. The name of 16-bit register is IR (Instruction Register) that is partitioned into two subfields in Figure D below). Bits 0 through 7 are assigned the symbol L (for Low byte) and bits 8 through 15 are assigned symbol H (for high byte). Symbol IR (L) refers to low-order byte and IR (H) refers to high-order byte.

569_Convention used to represent micro-operations.png

Figure: Register Formats

 


Related Discussions:- Convention used to represent micro-operations

Define word length, Define word length?  Every group of n bits is refer...

Define word length?  Every group of n bits is referred to as a word of information and n is known as the word length.

What must the requirement of designer to get memory capacity, In applicatio...

In applications where the required memory capacity cannot be satisfied by a single available memory IC chip, what should the designer do to meet this requirement? Ans: If th

What is the difference between activity and sequence diagram, The following...

The following are the difference among Activity and Sequence Diagrams: A sequence diagram represents the way of processes implement in a sequence. For example, the order of op

What is a serial port, What is a serial port?  A serial port transfers...

What is a serial port?  A serial port transfers and receives data single bit at a time.

What is meant by the guest function, When  transferring  one  functio...

When  transferring  one  function  to  another,  what  is  meant  by  the  guest  function? A pointer to a function can be passed to another function as an argument. This allows

Low on the data-input line, For the 8-bit bidirectional register in Figure ...

For the 8-bit bidirectional register in Figure 3, verify the status of the register after every clock pulse for the LEFT RIGHT /control waveform given. A HIGH on this input permits

Define the term internet, Internet:  The Internet, an umbrella term cov...

Internet:  The Internet, an umbrella term cover countless network and services that comprise a super-network, is a global network of computer networks that was started in the 1

Game playing techniques - artificial intelligence, Game Playing techniques ...

Game Playing techniques - artificial intelligence: Now we have dispensed with the essential background material for Artificial Intelligence problem solving techniques, and we m

#title.linear programming, zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>...

zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>=3 x1-x2+x3>=2 x1,x2,x3>=0

What is sap locking, What is SAP locking? It is a mechanism for describ...

What is SAP locking? It is a mechanism for describing and applying logical locks to database objects.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd