Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about data registers?
The data registers are used just for storing intermediate results or data and not for operand address calculation.
Some dedicated address registers are:
Segment Pointer : Employed to point out a segment of memory.
Index Register : These are used for index addressing scheme.
Stack Pointer: Points to top of stack when programmer visible stack addressing is used.
One of fundamental issues with register design is number of general-purpose registers or data and address registers to be provided in a microprocessor. Number of registers also affects instruction design as number of registers concludes the number of bits required in an instruction to specify a register reference. In common it has been found that optimum number of registers in a CPU is in range 16 to 32. In case registers fall below range then more memory reference per instruction on an average will be required as some of intermediate results then have to be stored in memory. Instead if the number of registers goes above 32 then there is no appreciable reduction in memory references. Though in a number of computers hundreds of registers are used. These systems have special features. These are known as Reduced Instruction Set Computers (RISC) and they exhibit this property.
An EFI boot manager is also used to select and load the operating system, removing the require for a dedicated boot loader mechanism
Difference between the testing and verification. Verification proves conformance with a specification. Testing tries to find cases where the system does not meet its specifi
Detail explanation of Cryptographic modules Physical security of the cryptographic modules is also built in order to provide total security of the whole system and protect from
In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate Traf
Enumerate the data structures used during the first pass of the assembler. Indicate the fields of these data structures and their purpose/usage. Three main data structures used
source code for binary multiplication in matlab
In class SlotCollection, remove the fields slot1, slot2, slot3 and slot4 and replace them by an array of slots. Modify the rest of the program to work using this array. There is
What is pipelining? What are the various hazards encountered in pipelining? Explain in detail. The major characteristics of a pipeline are: a) Pipelining cannot be exe
A sorting method which uses the binary tree concept such that label of any node is larger than all the labels in the sub trees, is called A Sorting method which uses the binar
#what is decoders? explain with diagram
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd