Explain in brief about the insert operation, Computer Engineering

Assignment Help:

INSERT OPERATION

The insert operation inserts a new value into a set of bits. This is done by first masking bits and then O ring them with required value. For illustration, suppose that an A register have eight bits, 0110 1010 to replace the four leftmost bits by value 1001 we first four unwanted bits:-

 0110 1010 A before

 0000 1111 B (mask)

 0000 1010 A after masking

And then insert new value:-

 0000 1010 A before

 1001 0000 B (insert)

 1001 1010 A after insertion

mask  operation  is  an  AND  microoperation  and insert  operation  is  an  OR microoperation.

 


Related Discussions:- Explain in brief about the insert operation

Database, what are the Database designs to avoid?

what are the Database designs to avoid?

What are instruction hazards, What are instruction hazards? The pipelin...

What are instruction hazards? The pipeline might also be stalled because of a delay in the availability of an instruction. For instance, this may be a result of a miss in the c

Explain policies for process scheduling, Explain any three policies for pro...

Explain any three policies for process scheduling that uses resource consumption information. All three policies for process scheduling are explained below in brief: 1. Fi

Processor, what is the difference between i5 and i7 processor?

what is the difference between i5 and i7 processor?

Internal structure of agents - artificial intelligence, Internal Structure ...

Internal Structure of Agents: We have looked at agents in terms of their external influences and behaviors: they put in from the surroundings and perform rational actions to a

Big – endian and little- endian representations, Explain Big - Endian and L...

Explain Big - Endian and Little- Endian representations Ans: The Big- endian is used where lower byte addresses are used for the more significant bytes (leftmost bytes) of the

Advantages and disadvantages of public key cryptography, What are the advan...

What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans

Delete the leaves of a binary tree, Write a recursive algorithm to delete t...

Write a recursive algorithm to delete the leaves of a binary tree. Programming Requirements You must use the binary search tree code provided.  Each algorithm must be impleme

Function name or connective symbol, Function name or connective symbol: ...

Function name or connective symbol: Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are the

Loadrunner would you use to record a script, What Component of LoadRunner w...

What Component of LoadRunner would you use to record a Script? Ans) The Virtual User Generator (VuGen) component is used to record a script. It enables you to make Vuser scripts

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd