what are the features of microprocessor ?, Basic Computer Science

Assignment Help:
Previously two sections the fundamentals of the workings and architecture of the central processing unit has been explained. There has been a common look at easy processor architecture, a clarification of the technique by which instructions are executed, and how the range of different addressing modes anxiety how the CPU processes instructions. Though, modern CPUs are very hardly ever as easy as the ones that have been discussed thus far.
While the information covered up to this position is still applicable and applicable to the majority of microprocessors, many refinements to the workings and architecture have also been implemented.
• Pipelining
This is a technique by which the processor can be occupied in the execution of more than a single instruction at once. Justifiably, this enables the execution of the program to be finished with greater speed, but is not without complications and problems. These have to be defeat by careful design.
• CISC and RISC architectures
In excess of the course of the development of the modern day processor, two competing architectures have appeared. CISC and RISC have more than a few major differences in features and ideas, but both were designed with the intention of improving CPU performance. At Present processors tend not to be severely adhering to either architecture, in its place being a mix of the two ideals.
• Modern architectures
Exterior of pipelining, RISC and CISC, many other improvements to the common architecture of the microprocessor have been developed. These are in many differing areas for example cache memory and specialized instruction set extensions. New advancements are added with every new production of processors.

Related Discussions:- what are the features of microprocessor ?

Scheme, There is a path between two vertices if there is a series of edges ...

There is a path between two vertices if there is a series of edges that you can use to travel between them. For example, between vertices 1 and 3 above, there is a path made up of

Understanding human intelligence in social, Understanding human intelligenc...

Understanding human intelligence in social AI can be taken as just the current tool in the philosopher's toolbox for answering of questions for the behaviour of human intellig

Assigment, how to measure marginal utility.?

how to measure marginal utility.?

Data structuures, write a fuctions for MIDSQUARING hashing technique

write a fuctions for MIDSQUARING hashing technique

What are the characteristics of a good documentation?, Question 1 What are...

Question 1 What are the differences between closed and open systems? Question 2 What are the characteristics of a good documentation? Question 3 What are the steps invol

Network, Give a topology (network diagram) in which there is a link whose f...

Give a topology (network diagram) in which there is a link whose failure will change many routes. Give one in which there is a link whose failure will not change any routes

Challenges in building information system, discuss the three major challeng...

discuss the three major challenges in building information system in an organization

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd