How can we decrement and increment operations, Computer Engineering

Assignment Help:

How can we decrement and increment  operations

We  can  implement decrement  and increment  operations  by  using  a  combinational circuit  or  binary  down/up counters.  In  most  of  computers  multiplication  and division are implemented using subtract/add and shift micro-operations. If a digital system has implemented multiplication and division by means of combinational circuits then we can call these as micro-operations for that system. An arithmetic circuit is usually implemented by parallel adder circuits. Each of multiplexers (MUX) of given circuit has two select inputs. This 4-bit circuit takes two inputs of 4-bit data values and carry-in-bit and outputs four resultant data bits and a carry-out-bit.

With different input values we can obtain various micro-operations.

 Equivalent micro-operation Micro-operation name

R V R + R1 2 Add

R V R + R  +11 2 Add with carry

R V R + R1 2 Subtract with borrow

R V R + 2's1 Subtract

R V R1 Transfer

R VR + 11 Increment

R V R - 11 Decrement

 


Related Discussions:- How can we decrement and increment operations

Instruction set architecture - assembly language, Instruction Set Architect...

Instruction Set Architecture (ISA): The Instruction Set Architecture (ISA) is the part of the processor which is noticeable to the compiler writer or programmer. The ISA serve

Illustrate the categories of micro computers, Illustrate the categories of ...

Illustrate the categories of micro computers Micro computers are usually categorized into desktop models and laptop models.  They are awfully limited in what they can do when c

Give solution for readers-writers problem, Give a solution for readers-writ...

Give a solution for readers-writers problem using conditional critical regions. Solution for readers-writers problem using conditional critical regions: Conditional critical

Data structures.., in asingle function declaration what is maximum no of st...

in asingle function declaration what is maximum no of statements that may be recursive calls

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Prove boolean identities using boolean algebra, Prove the following Boolean...

Prove the following Boolean identities using the laws of Boolean algebra: ABC + AB ‾C + ABC ‾ = A(B + C) Ans. ABC+AB'C+ABC'=A(B + C) LHS AC(B+B')+AB(C+C') OR  AC+AB OR  A(B

Baic electrical, Ask question #Minimumstate and explain thevenins theorem a...

Ask question #Minimumstate and explain thevenins theorem as applicable to electrical circuits 100 words accepted#

Explain the program invisible registers, What are program invisible registe...

What are program invisible registers? Global and local descriptor tables are found in memory system. In order to specify and access the address of these tables, program invisi

Difference between narrative form and documentary form, Question: (a) E...

Question: (a) Explain clearly the difference between a Proposal and a Treatment for a video production project. (b) Explain clearly the difference between Narrative form an

What do you mean by loader, Q. What do you mean by Loader? Loader is a ...

Q. What do you mean by Loader? Loader is a program that assigns absolute addresses to program. These addresses are produced by adding the address from where program is loaded i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd