Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Micro-instruction Formats?
Now let's focus on format of a micro-instruction. The two widely used formats employed for micro-instructions are vertical and horizontal. In horizontal micro-instruction every bit of micro-instruction signifies a control signal that directly controls a single bus line or occasionally a gate in the machine. Though the length ofsuch a micro-instruction can be hundreds of bits. A typical horizontal micro-instruction with its related fields is demonstrated in Figure below.
(a) Horizontal Micro-instruction
(b) Vertical Micro-instructions
Figure: Micro- instruction Formats
In a vertical micro-instruction several similar control signals can be encoded in a few micro-instruction bits. For example for 16 ALU operations that may need 16 individual control bits in horizontal micro-instruction only 4 encoded bits are required in vertical micro-instruction. In the same way in a vertical micro-instruction only 3 bits are required to select one of eight registers. Though these encoded bits need to be passed from the respective decoders to get the individual control signals. This is shown in figure above.
Generally a horizontal control unit is faster however requires wider instruction words while vertical control units though; require a decoder are shorter in length. Most of systems employ neither purely vertical nor purely horizontal micro-instructions figure (c) above.
Define the role of organizationin computer architecture The organization is the set of resources that realizes the architecture which include the CPU, the memory and I/O contro
Jobs which are admitted to the system for processing is called ? Ans. Long-term scheduling is admitted to the system for processing.
Characteristics of computer storage: Storage technologies at all of levels of the storage hierarchy may be distinguished by evaluating particular core characteristics and alon
Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small
What is a transaction? A transaction is dialog program that alter data objects in a consistent way.
Hi I study master of computer science I have assignment for subject statical natural language processing . I need solved due date on 6 May2014 at 11 pm Australia time I need yo
Exponential Search Another alternative to variable size decrease-and-conquer search is known as exponential search. This algorithm begins searching at the beginning of the list
Determine the basic Machine language instructions Machine language instructions and data are in terms of 0s and 1s and are stored in the memory. It isn't possible to distinguis
Initial thought process: Design a script which was simple and user friendly. Integrate procedures/functions to extract data under the hood. I focused on giving the user the o
Define Cloud services with example. Any web-based application or service offered by cloud computing is known as a cloud service. Cloud services can contain anything from calend
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd