Opcode field of an instruction, Computer Engineering

Assignment Help:

For this machine there can be two more possible addressing modes in addition to direct andimmediate.  

Opcode field of an instruction is a group of bits which define various processor operations like LOAD, STORE, ADD and SHIFT to be performed on some data stored in registers or memory.  

The operand address field can be data or can refer to data- which is address of data or can be labels which may be the address of an instruction you want to execute next, these kind of labels are generally used in Subroutine call instructions. An operand address may be: 

  • CPU register address
  • Memory address
  • I/O device address

The mode field of an instruction specifies a range of alternatives for referring to operands using the given address. Please note that if operands are placed in processor registers then an instruction executes faster than that of operands placed in memory as the registers are very high-speed memory used by CPU. Though to put the value of a memory operand to a register you will need a register LOAD instruction.


Related Discussions:- Opcode field of an instruction

Advantage and disadvantage of threaded binary trees, Advantage  1.     ...

Advantage  1.       By doing threading we neglect the recursive method of traversing a Tree , which makes use of stack and consumes many memory and time . 2.       The node

Describe miscellaneous and privileged instructions, Q. Describe Miscellaneo...

Q. Describe Miscellaneous and Privileged Instructions? These instructions don't fit in any of above categories. I/O instructions: start I/O, stop I/O, and test I/O. Characteris

Poor technology or system requirements definition, Poor Technology or Syste...

Poor Technology or System Requirements Definition - Information System Previously we looked at product design and specifically the importance of requirements capture as part o

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

What is ai checkers, The major programs here are Arthur Samuel's, the rote ...

The major programs here are Arthur Samuel's, the rote learning method which is a lot like a memory based method, generalization learning which is a lot like backprop and a signatur

Binary floating-point number range, Q. Binary floating-point number range? ...

Q. Binary floating-point number range? Smallest Negative number   Maximum mantissa and maximum exponent     =    - (1 -2 -24 ) × 2 127   Largest negative number

Computer, How does computer started?

How does computer started?

Two ways for restricting the value range for a domain, What are the two way...

What are the two ways for restricting the value range for a domain? By specifying fixed values. By stipulating a value table.

What is meant by common control, What is meant by common control? In se...

What is meant by common control? In several switching systems, the control subsystem may be an integral part of the switching network itself. This system is termed as direct co

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd