Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about data registers?
The data registers are used just for storing intermediate results or data and not for operand address calculation.
Some dedicated address registers are:
Segment Pointer : Employed to point out a segment of memory.
Index Register : These are used for index addressing scheme.
Stack Pointer: Points to top of stack when programmer visible stack addressing is used.
One of fundamental issues with register design is number of general-purpose registers or data and address registers to be provided in a microprocessor. Number of registers also affects instruction design as number of registers concludes the number of bits required in an instruction to specify a register reference. In common it has been found that optimum number of registers in a CPU is in range 16 to 32. In case registers fall below range then more memory reference per instruction on an average will be required as some of intermediate results then have to be stored in memory. Instead if the number of registers goes above 32 then there is no appreciable reduction in memory references. Though in a number of computers hundreds of registers are used. These systems have special features. These are known as Reduced Instruction Set Computers (RISC) and they exhibit this property.
What are concentrators? Explain how it helps in connecting number of subscribers. In rural areas, subscribers are usually dispersed. This is both unessential and expensive to g
general computer animation functions
SEARCH is a sequential search from the starting of the table. SEARCH ALL is a binary search, continually dividing the table in two halves until a match is found. SEARCH ALL is more
The number of control lines for 32 to 1 multiplexer is ? Ans. For 32 (2 5 ) the number of control lines and to select one i/p between them total 5 select lines are needed.
Discuss about Constrained-Random Verification Methodology Advent of constrained-random verification gives verification engineers an effective method to achieve covera
Configure port A for the lower 4 bits to be inputs and the upper 4 bits to be outputs. The program should chase a logic one from Pa4 -> Pa7, depending upon the condition of Pa0-Pa3
Fitness function - canonical genetic algorithm: Conversely the fitness function will use an evaluation function to calculate a value of worth for the individual accordingly th
Efficiency of Vector Processing over Scalar Processing As we know a serial computer processes single scalar operands at a time. So if we have to process a vector of length 'n'
E-Cash: E-cash is cash shown by two models. One is the on-line form of e-cash (introduced by DigiCash) which permits for the completion of all types of internet transactions.
Give explanation about Stored Program Control. Stored Program Control: In this centralized control, all the control equipment is replaced through a single processor that must
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd