Convention used to represent micro-operations, Computer Engineering

Assignment Help:

Q. Convention used to represent micro-operations?

The convention used to represent micro-operations is:

1.  Computer register names are designated by capital letters (sometimes followed by numerals) to denote its function. For illustration R1, R2 (General Purpose Registers), AR (Address Register), IR (Instruction Register) etc. 

2. Individual bits within a register are numbered from 0 (rightmost bit) to n-1 (leftmost bit) as shown in Figure below). Common ways of drawing block diagram of a computer register are displayed below. The name of 16-bit register is IR (Instruction Register) that is partitioned into two subfields in Figure D below). Bits 0 through 7 are assigned the symbol L (for Low byte) and bits 8 through 15 are assigned symbol H (for high byte). Symbol IR (L) refers to low-order byte and IR (H) refers to high-order byte.

569_Convention used to represent micro-operations.png

Figure: Register Formats

 


Related Discussions:- Convention used to represent micro-operations

What is managed extensibility framework, What is managed extensibility fram...

What is managed extensibility framework? Managed extensibility framework (MEF) is a new library that is introduced as a part of .NET 4.0 and Silverlight 4. It helps in extendin

What are the ways to truncate guard bits, What are the ways to truncate gua...

What are the ways to truncate guard bits? 1. Chopping 2. Von Neumann rounding 3. Rounding procedure.

Explain scripts and libraries introduction, Scripts A script within Rati...

Scripts A script within Rational Robot is a file that haves a sequence of SQABasic code. The extension of the file is always ".REC". Typically the script have an automated testc

Define bus, Define bus A group of lines that serves as a connecting pat...

Define bus A group of lines that serves as a connecting path for various devices is known as a bus.

How many methods used to control traffic flowing in-out, How many methods u...

How many methods used to control traffic flowing into and out of the network by firewall? Firewalls utilize one or more of three ways to control traffic flowing into and out of

Define target _blank, TARGET = "_blank" "_blank" opens new document in...

TARGET = "_blank" "_blank" opens new document in a new window. Run the code given in Figure and check how it works. This value doesn't require the use of any frames. "_blank"

Why we need to construct state transition diagram, Why we need to construct...

Why we need to construct state transition diagram Basically you need to construct a state transition diagram for each object with important behaviour. You need not construct on

Show encoding data options, Q. Show Encoding data options? PVM uses SUN...

Q. Show Encoding data options? PVM uses SUN's XDR library to make a machine independent data format if you request it. Settings for encoding option are:  PvmDataDefault: Use

Determine the concepts of object oriented analysis, Determine the concepts ...

Determine the concepts of Object Oriented Analysis  In OOA the initial focus is on identifying objects from the application domain, after that fitting those procedures around

IEEE802, 1. (a) Given a baseband bus with station 1 located at 10m, station...

1. (a) Given a baseband bus with station 1 located at 10m, station 2 located at 1000m, and station 3 located at 1010 meters (see diagram above). If the data rate of the bus is 10 M

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd