Instruction-execution cycle, Computer Engineering

Assignment Help:

Problem

(a) Using a labelled diagram of an Instruction-Execution cycle, describe how a CPU executes single machine instructions by referring to the five main operations.

(b) Differentiate between pipelined and non-pipelined processors.

(c) Using an example of your own, describe how a superscalar processor eliminates wasted cycles as compared to a conventional processor when executing multiple instructions at the same time.

(d) (i) Convert the numbers (12121)3 and (0.2143)8 to decimal. Display all workings.

(ii) What is the binary representation of hexadecimal number E5B6AED7?

(iii) Convert the floating number (78.375)10 to binary.

(e) During performance design, explain three factors that help in increasing the throughput of a system.

(f) The performance of a machine X for a given program is defined as: Performance (X) = 1 / Execution Time(X)

Provide that a machine A does a task in 20s while another machine B does the same task in 25s.

(i) What is the performance of each machine?

(ii) How much faster is A than B?

(iii) Is "performance" a meaningful metric?


Related Discussions:- Instruction-execution cycle

Classification of digital computer, CLASSIFICATION  OF DIGITAL COMPUTER ...

CLASSIFICATION  OF DIGITAL COMPUTER Computer are classified under a number of factors.Some people classify them according to their processing speed.main memory,technology used

Data structure, Process: pid start time end time priority t...

Process: pid start time end time priority timeslice list of CPU bursts list of IO bursts (the number of IO burst will always be 1 less than the number of CPU

Give explanation of common channel signalling, Explain Common channel signa...

Explain Common channel signalling. Common channel signalling: Signaling systems connection the variety of transmission systems, switching systems and subscriber equipments, i

Explain the functioning of firewall using screening router, Explain the fun...

Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve

Define how ptrace is used by debuggers, State how Shared Memory is used for...

State how Shared Memory is used for inter process communication. Define how ptrace is used by debuggers.  What are modules? Explain how data mapping takes place among modules

Show the reset and submit buttons in html, Reset and Submit are special typ...

Reset and Submit are special types of input buttons. Submit is used to send data to the server and Reset resets/clears the form.

What is real time clock, Real time clock A real-time clock keeps the t...

Real time clock A real-time clock keeps the time in real time - i.e. in hours and minutes. Software for the real-time clock comprises an interrupt service procedure which is c

Prolog artificial intelligence , 1. countdown Example: countdown(5,[5,4,3,2...

1. countdown Example: countdown(5,[5,4,3,2,1]).  NOTE - your function should be able to answer questions such as: ?- countdown(5,L).  2. count_occur Example: count_occur(7,[5,2,6

Visibility, hidden edge/surface removal

hidden edge/surface removal

Define device interface, Define device interface. The buffer registers ...

Define device interface. The buffer registers DATAIN and DATAOUT and the status flags SIN and SOUT are part of circuitry commonly called as a device interface.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd