Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Indirect Cycle in control unit?
Once an instruction is fetched the subsequent step is to fetch the operands. The instruction may have indirect and direct addressing modes. An indirect address is controlledemploying indirect cycle. The below micro-operations are needed in indirect cycle:
T1: MAR ← IR (address)
T2: MBR ← [MAR]
T3: IR (address) ← MBR (address)
The MAR is loaded with address field of IR register. Then memory is read to fetch the address of operand that is transferred to address field of IR through MBR as data is received in MBR during read operation.
So the IR now is in same state as of direct address viz as if indirect addressing hadn't been used. IR is now ready for execute cycle.
Explain the concept of top-down design for a program. Top down Design: A top-down approach is fundamentally breaking down a system to gain insight into its compositional s
How does CPU know that an interrupt has taken place? There needs to be a line or a register or status word in CPU which can be increased on occurrence of interrupt situation.
Q. Programming with loops and comparisons? This segment deals with more practical illustrations employing comparison, loops and shift instructions. Simple Program Loops
Broad Band ISDN handles data rate of about (A) 64 kbps (B) 100 mbps (C) 5.4 mbps (D) 2.048 mbps
Q. What basic concepts of evolution are used by the genetic algorithm? ANSWER: The three concepts are selection, crossover and mutation. Selection is the feature of a genetic a
Q. Develop a Menu driven program with following menu: 1. Gray code 2. BCD 3. Excess-3 code 4. Exit I/P must be a valid Binary number. Fractional numbers are all
For this exercise you have to gather and report some linguistic data. Make sure your data are accurate by checking them with a native speaker if you yourself are not a native speak
Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list
Explain about the Biometrics This includes obtaining data and identifying characteristics automatically in security systems e.g. use of palm prints, finger prints, facial ima
How are problems of clock skew minimized? Clock skew, when done right, can also benefit a circuit. This can be intentionally introduced to reduce the clock period, at that the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd