Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Direct Addressing and Immediate Addressing mode - computer architecture:
Immediate Addressing:
It is the simplest form of addressing. Here, the operand is itself given in the instruction. This mode is used to define constant or set primary values of variables. The benefit of this mode is that no memory reference rather than instruction fetch is needed to obtain operand. The disadvantage of it is that the size of the number is restricted to the size of the address field, in which most of the instruction sets is small compared to word length.
Direct Addressing:
Effective address of the operand is given in the address field of the instruction in the case of direct addressing mode. It need one memory reference to read the operand from the given location and provides only a restricted address space. Length of the address field is typically less than the word length.
For Example: Move P, Ro, Add Q, Ro P and Q are the address of operand. Indirect
Show System call for cloning. Standard form of Clone function is as follows: Int clone (Int (*FN) (), void *child stack, Int flag, intargs,); Parameter FN is Pointer fro
Q. Why do businesses need systems analysts? A computerized system allows an organization to provide accurate information and respond faster to queries, events etc. If a busines
You are to write a C program called big_mult.c that multiplies two unsigned 64-bit integers, x and y, read from the command line. The output is a pair of unsigned 64-bit integers r
Inherent addressing Here the address is already built in to the instruction i.e. inherent to the code ABA ; Add A to B and store the answer in A Simple programs using
ARQ is transmitted in the event of: (A) Loss of signal (B) Error in received data (C) Improve reliability (D) During time out
Q. What is Compact Disk Read Only Memory? This technology has evolved out of entertainment electronics market where cassette tapes and long playing records are being replaced b
Question 1 Give a brief explanation on message oriented middleware Question 2 Describe Distributed object model Question 3 Explain File systems in a distributed computing Env
How many "true" terrorists are there in the US? I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000. That is, one person in 100,000 i
The excess-3 code of decimal 7 is represented by ? Ans. An excess 3 code of decimal 7 is equal to the binary code +3.
Defines a macro Defines a macro with the given name, having as its value the given replacement text. After that (for the rest of the current source file), wherever the preproce
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd