What are the logic micro-operations, Computer Engineering

Assignment Help:

Q. What are the Logic Micro-operations?

Logic operations are fundamentally binary operations that are performed on string of bits stored in the registers. For a logic micro-operation every bit of a register is treated as a variable.

A logic micro-operation:

R1 ← R1.R2 specifies AND operation to be performed on contents of R1 and R2 in addition store the results in R1. For illustration if R1 and R2 are 8 bits registers and:

R1 comprise 10010011 and

R2 comprise 01010101

    Then R1 will comprise 00010001 after AND operation.

Some of the common logic micro-operations are AND, OR, NOT or Complement, Exclusive OR, NOR and NAND. In many computers only four: AND, OR, XOR (exclusive OR) and complement micro-operations are implemented.

Let's now discuss how these four micro-operations can be employed in implementing some of significant applications of manipulation of bits of a word like changing some bit values or deleting a group of bits. We are presuming that resultof logic micro-operations go back to Register R1 and R2 comprises the second operand.

We will play a trick with manipulations we are performing. Let's select 1010 as 4 bit data for register R1 and 1100 data for register R2. Why? Since if you see bit combinations of R2 and R1 they represent the truth table entries (read from right to left and bottom to top)  00, 01, 10 and 11. So resultant of logical operation on them will signify which logic micro-operation is required to be performed for that data manipulation. The below table gives details on some of these operations:

R1                                                                    1          0          1          0

R2                                                                    1          1          0          0

2130_What are the Logic Micro-operations.png


Related Discussions:- What are the logic micro-operations

One can use the event get in a report without ldb attribute, One can use th...

One can use the event GET in a report without LDB attribute. False. no one can use the event GET in a report without attribute.

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Working on dreamweaver, Write your text, format text, insert picture throug...

Write your text, format text, insert picture through Object window or INSERT -> IMAGE. Insert Menu provides you all features which are available under the Object window. Modify men

Explain the process of theory driven discovery, Question 1 Explain brie...

Question 1 Explain briefly the process of matching production rules against working memory 2 Explain Simplification, Conjunction and Transportation in propositional logic by

Where does the cpu enhanced mode originate , Intel's 8086 was the first 32-...

Intel's 8086 was the first 32-bit processor, and as the company had to backward-support the 8086. All the modern Intel-based processors will run in the Enhanced mode, capable of sw

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Find the simplified function, Q. F' (A, B, C, D) = (A + B + D')(A + C' + D'...

Q. F' (A, B, C, D) = (A + B + D')(A + C' + D')(A + B' + C')        D' (A, B, C, D) = (A + B' + C + D')(A' + C' + D')(A' + B + D)        Find the simplified function F and imple

Qwerty-based keyboards, QWERTY-based keyboards In addition the standard...

QWERTY-based keyboards In addition the standard alphabet keys having QWERTY arrangement, a computer keyboard also comprises the control (alt, Del, Ctrl etc. keys) and function

Java, about java types

about java types

Works flowing related technologies influence e-business, How the works do f...

How the works do flowing related technologies influence e-business? Work Flow related Technologies influence e-business: Microsoft CRM automates internal business process

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd