Give detail explanation about arithmetic micro-operations, Computer Engineering

Assignment Help:

Give detail explanation about Arithmetic Micro-operations

These micro-operations perform some essential arithmetic operations on numeric data stored in the registers. These basic operations can be addition, subtraction, incrementing or decrementing a number and the last one is arithmetic shift operation. An 'add' micro-operation may be specified as: R V R + R3 1 2

It implies: add contents of registers R and R and store sum in register R .1 2 3

The add operation mentioned over requires three registers along with addition circuit in ALU.

Subtraction is implemented with complement and addition operation as:

 R  V R - R3 1 2 is implemented as

 R  V R + (2's complement of R )3 1 2

 R  V R + (1's complement of R  + 1)3 1 2

 R  V R + R  + 13 1 2

An increment operation can be shown as:

 R  V R + 11 1

While a decrement operation can be refer as:

 R  V R - 11 1

 


Related Discussions:- Give detail explanation about arithmetic micro-operations

Show the layout of dvorak-dealey keyboard, Q. Show the layout of Dvorak-Dea...

Q. Show the layout of Dvorak-Dealey keyboard? This was one keyboard layout designed to be a challenger to QWERTY layout. This was designed by August Dvorak and William Dealey a

Find fiber distributed data interconnect is an example of, FDDI (Fiber Dist...

FDDI (Fiber Distributed Data Interconnect) is an example of? Fiber Distributed Data Interconnect is an illustration of token ring.

Define memory allocation functions, The various memory allocation functions...

The various memory allocation functions are described below: (i) malloc( ) : It is a memory allocation function that assigns requested size of bytes and returns a pointer to t

Define pvm library routines, Q. Define PVM library routines? In this se...

Q. Define PVM library routines? In this segment we will give a short description of the routines in PVM 3 user library. Each PVM program must comprise the PVM header file 'pvm3

Various threats posed by server in client server environment, Explain vario...

Explain various threats posed through servers into a client server environment. Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are no

Determine about the term- voice synthesis, Voice synthesis Loud speakers ...

Voice synthesis Loud speakers and special software are used to output information in the form of sound to help blind and partially-sighted people; it also helps people who have d

If the system is not booting what can we do, First we must go to bios and s...

First we must go to bios and should check boot sequence,local add statusOr we should check RAM & check h.d.d cable. check cd writer for cd or dvd

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd