Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Direct Addressing and Immediate Addressing mode - computer architecture:
Immediate Addressing:
It is the simplest form of addressing. Here, the operand is itself given in the instruction. This mode is used to define constant or set primary values of variables. The benefit of this mode is that no memory reference rather than instruction fetch is needed to obtain operand. The disadvantage of it is that the size of the number is restricted to the size of the address field, in which most of the instruction sets is small compared to word length.
Direct Addressing:
Effective address of the operand is given in the address field of the instruction in the case of direct addressing mode. It need one memory reference to read the operand from the given location and provides only a restricted address space. Length of the address field is typically less than the word length.
For Example: Move P, Ro, Add Q, Ro P and Q are the address of operand. Indirect
Q. Analysts in Computer Operations? Computer Operations: All of the shared computers comprising mainframes, minicomputers and other computers are put to operation and same is c
Explain about the postpurchase interaction briefly. Postpurchase Interaction: Customer support and service: The considerations at such can be explained by the followin
One's Complement Operator: ~ The one's complement operator, sometimes called the "bitwise complement" or "bitwise NOT" operator, produces the bitwise one's complement of its op
What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans
detail explanation
Determine the Ad hoc testing - It is a type of testing which is performed without the use of planning or/and documentation. - These tests are run only one time unless a defe
Traffic Intensity can be measured in (A) Erlangs (B) CCS (C) CM (D) All of the above Ans:
Why is TCP called end-to-end protocol? TCP is termed as an end-to-end protocol as this provides a connection directly by an application in one computer to an application on a r
Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using K-maps Ans. The logic function minimization of F(A, B, C, D) = ∑ m(1,3,5,8,9,11.15) + d(2,13) by
different locking techniques
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd