What are the logic micro-operations, Computer Engineering

Assignment Help:

Q. What are the Logic Micro-operations?

Logic operations are fundamentally binary operations that are performed on string of bits stored in the registers. For a logic micro-operation every bit of a register is treated as a variable.

A logic micro-operation:

R1 ← R1.R2 specifies AND operation to be performed on contents of R1 and R2 in addition store the results in R1. For illustration if R1 and R2 are 8 bits registers and:

R1 comprise 10010011 and

R2 comprise 01010101

    Then R1 will comprise 00010001 after AND operation.

Some of the common logic micro-operations are AND, OR, NOT or Complement, Exclusive OR, NOR and NAND. In many computers only four: AND, OR, XOR (exclusive OR) and complement micro-operations are implemented.

Let's now discuss how these four micro-operations can be employed in implementing some of significant applications of manipulation of bits of a word like changing some bit values or deleting a group of bits. We are presuming that resultof logic micro-operations go back to Register R1 and R2 comprises the second operand.

We will play a trick with manipulations we are performing. Let's select 1010 as 4 bit data for register R1 and 1100 data for register R2. Why? Since if you see bit combinations of R2 and R1 they represent the truth table entries (read from right to left and bottom to top)  00, 01, 10 and 11. So resultant of logical operation on them will signify which logic micro-operation is required to be performed for that data manipulation. The below table gives details on some of these operations:

R1                                                                    1          0          1          0

R2                                                                    1          1          0          0

2130_What are the Logic Micro-operations.png


Related Discussions:- What are the logic micro-operations

Develop a calculator in masm, Assignment:  develop a calculator in MASM. ...

Assignment:  develop a calculator in MASM. Text chapters covered:  1 through 4, 5.4, 5.5, 6.3, 7.4 You will develop a "calculator" algorithm in MASM using reverse-polish nota

Determine no.of processes to avoid race condition, To avoid race condition,...

To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is The maximum number of processes is one to ignore race conditi

Compute the different stages of kohlbergs theory, Problem 1 (a) Identi...

Problem 1 (a) Identify and briefly describe the possible roles of Codes of Ethics (b) Describe why is a code of ethics important to stakeholders. (c) Explain how should

What are various ids associated with a process, What are various IDs associ...

What are various IDs associated with a process? Unix identifies each process with a unique integer known as ProcessID. The process that implements the request for creation of a

Classification of parallel computers , Classification Of Parallel Computer...

Classification Of Parallel Computers  Introduction Parallel computers are those that underline the parallel processing among the operations in some way. In the last unit,

Conversion of decimal number 25.5 into binary number, Conversion of decimal...

Conversion of decimal number 25.5 into binary number Ans. There is integer part is 25 and fractional part is 0.5.  Firstly convert the integer part 25 in its equal to binary numb

Explain the advantages of computer, Explain the advantages of computer ...

Explain the advantages of computer Computer is one of the main components of an Information Technology network and getting increasing popularity. Nowadays, computer technology

Explain about batch system, Q. Explain about Batch System? A number...

Q. Explain about Batch System? A number of computer systems only did one thing at a time. They had a list of computer system can be dedicated to a single program till its c

Maximum size of a database, What is the maximum size of a database that can...

What is the maximum size of a database that can be opened in Microsoft Access? Ans) 1 Gigabyte

Risc architecture - computer architecture, RISC  architecture - computer a...

RISC  architecture - computer architecture: What is reduced regarding it? The answer of this question is that to make all instructions the equal length the number of bits that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd