Explain micro-operations performed by cpu, Computer Engineering

Assignment Help:

Q. Explain Micro-operations performed by CPU?

The micro-operations performed by CPU can be categorized as:   

  • Micro-operations for data transfer from register-memory, register-register, I/O-register etc.
  • Micro-operations for performing arithmetic, logic as well as shift operations. These micro-operations include use of registers for input and output.

The fundamental responsibility of control unit lies in the fact that control unit should be able to guide the various components of CPU to perform a particular sequence of micro-operations to achieve the execution of an instruction.


Related Discussions:- Explain micro-operations performed by cpu

Advantage or disadvantage of using INADDR_ANY, What is the advantage or dis...

What is the advantage or disadvantage of using INADDR_ANY instead of the IP address of the computer running on the server? The format of TCP/IP, structure sockaddr_in defines u

Domains of artificial intelligence, The major domains of AI research and...

The major domains of AI research and development. AI applications can be grouped under three major areas cognitive science robotics and natural interfaces though these class

Use of delay loops, A very useful application of assembly is to generate de...

A very useful application of assembly is to generate delay loops. These loops are used for waiting for some time before execution of subsequent instruction. However how to find

Why have companies gone ecommerce, One of these objectives is related to co...

One of these objectives is related to costs. By going e-commerce, consumers will be able to submit their purchase requests to the sellers without paying a visit to their place. Thi

Exdplain instruction buffers, Instruction buffers For taking the comple...

Instruction buffers For taking the complete advantage of pipelining pipelines must be filled continuously. So instruction fetch rate must be matched with pipeline consumption r

Determine the term- security, Determine the term- Security When using ...

Determine the term- Security When using Internet, security can be enhanced using encryption. Debit and credit card transactions can also be protected by a specific type of pas

Usb communication - computer architecture, Data packets: USB communica...

Data packets: USB communication takes the form of packets. Originally, all packets are sent from the host, using the root hub and possibly more hubs, to components. Some of th

SIDE EFFECT , EXPLAIN SIDE EFFECT OF SCAN CONVERSION WITH DIGRAM

EXPLAIN SIDE EFFECT OF SCAN CONVERSION WITH DIGRAM

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd