Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Control Memory Organization?
One of the simplest ways to organize control memory is to organize micro-instructions for different sub cycles of machine instruction in memory. The Figure below demonstrates such an organisation.
Figure: Control Memory Organisation
Let us give an illustration of control memory organization. Let's take a machine instruction: Branch on zero. This instruction causes a branch to a specified main memory address if result of the last ALU operation is zero which means zero flag is set. Pseudocode of micro-program for this instruction would be;
Test "zero flag" If SET branch to label ZERO
Unconditional branch to label NON-ZERO
ZERO: (Microcode that causes replacement of program counter with address offered in instruction)
Branch to interrupt or fetch cycle.
NON -ZERO: (Microcode that can set flags if desired indicating branch hasn't taken place).
Branch to interrupt or fetch cycle. (For Next- Instruction Cycle)
Explain the Resolution of an ADC. Ans. Resolution- It is the smallest possible change in input voltage the same as the fraction of percentage of the full s
Elements of Parallel Computing and Architecture Parallel computing. Then we shall describe why we need parallel computing and what the heights of parallel processing are. We s
Q. Copy file from a floppy disk to the hard disk? While using a PC, often you need to copy file from a floppy disk to the hard disk or vice-versa. For instance, you buy some s
What is the Role of Certifying Authority? A certificate authority is a body, that is either public or private, that seeks to fill the requirement for trusted third-party servic
How to fix an ASIC-based design from easiest to most extreme? There are different ways to fix an ASIC-based design as given below: Initially, assume some reviews fundamentally.
The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.
The Communication Traffic gives a pictorial view of the communication traffic in the interconnection network with respect to the time in progress. The Communication Traffic shows t
Use the input capture to control the digital clock. In this part, there will be two switches to control the clock, one is for starting the clock and one is for stopping the clock.
Explain about CSMA/CD It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other statio
How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd