Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Direct Addressing and Immediate Addressing mode - computer architecture:
Immediate Addressing:
It is the simplest form of addressing. Here, the operand is itself given in the instruction. This mode is used to define constant or set primary values of variables. The benefit of this mode is that no memory reference rather than instruction fetch is needed to obtain operand. The disadvantage of it is that the size of the number is restricted to the size of the address field, in which most of the instruction sets is small compared to word length.
Direct Addressing:
Effective address of the operand is given in the address field of the instruction in the case of direct addressing mode. It need one memory reference to read the operand from the given location and provides only a restricted address space. Length of the address field is typically less than the word length.
For Example: Move P, Ro, Add Q, Ro P and Q are the address of operand. Indirect
CPU burst time indicates the time, the process needs the CPU. The following are the set of processes with their respective CPU burst time (in milliseconds). Process
Q. Show Basic concepts of permutation? Let us look at the basic concepts of permutation with respect to interconnection network. Let us say the network has set of n input node
Differentiate between non-relocatable and relocatable programs. A non-relocatable program is one which cannot be executed in any memory area other than the area starting at i
what is time out based schemes in concurrency control
What is assembly language? Assembly language : It is a family of low-level language for microprocessors, programming computers, microcontrollers etc. All are implement a symbo
What are compilers and interpreters? Compiler and Interpreter: These are two types of language translators. A compiler changes the source program (user-written program) int
Public Key Encryption A cryptographic system that uses two-keys-a public key known to everyone and a private or secret key known only to the recipient of the message. An si
explain parallel database system
Massively Parallel System Refers to a parallel computer system having a great number of processors. The number in a great number of keeps increasing and currently it means more
What are the largest UDP messages that can fit into single Ethernet frame? UDP utilizes IP for delivery. As ICMP UDP packet is encapsulated in IP datagram. Therefore entire UDP
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd