Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Structural hazards - computer architecture:
A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same time. A structural hazard might take place, for example, if a program were to execute a branch instruction which is followed by a computation instruction. Because they are executed in parallel manner, and because branching is very slow (needing a comparison between program counter-related computation, and writing to registers), it is possible (depending on the architecture) that the both computation and the branch instruction will need the ALU (arithmetic logic unit) at the identical time.
When a machine is pipelined then overlapped execution of instructions needs pipelining of functional units and duplication of resources to permit all possible combinations of instructions in the pipeline.
If some particular combination of instructions can't be accommodated because of a resource conflict, the machine is denoting to have a structural hazard.
Common examples of structural hazards arise when Some functional unit is not completely pipelined. Then a sequence of instructions by using that un pipelined unit can't be proceed ahead at the rate of 1 per clock cycle
Some resource has not been duplicated adequate to permit all combinations of instructions in the pipeline to execute.
What is Immediate addressing The data itself, beside the address, is given as the operand or operands of the instruction.
What are the server specific middle wares? Server specific middle wares. Their role in e-commerce. Additional features needed by e-commerce server. Middleware is the term of
What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro
Eliminating hazards of pipeline - computer architecture: We can delegate the work of eliminating data dependencies to the compiler, which can fill up in suitable number of NO
what is data mining and what is its uses in a industry?
Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve
What is meant by concurrent execution of database transactions in a multi user system
Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net
Q. Explain about Quarter Inch Cartridge Tapes? Quarter Inch Cartridge Tapes (QIC Standard): These tape cartridges record information sequentially in a track with one head. Wh
Stack Organization The CPU of the most computers comprises of stack or called as last-in-first-out (LIFO) list in which information is stored in such a manner that item stored
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd