what is Decode or execution cycle?, Basic Computer Science

Assignment Help:
just the once the instruction has been fetched and is accumulated, the next step is to decode the instruction so as to work out what actions should be performed to execute it. This occupies examining the opcode to observe which of the machine codes in the CPU’s instruction set it communicates to, and also verifying which addressing mode needs to be used to get any required data.
Once the opcode is known, the execution cycle can take place. Different actions require to be carried out dependant on the opcode, without two opcodes requiring the same actions to occur. Though, there are usually four groups of different actions that can occur:
• Move of data between the CPU and memory.
• move of data between the CPU and an input or output devices.
• Processing of data, perhaps involving the use of the arithmetic and logic unit.
• A control operation, with the intention of change the sequence of subsequent operations. These can probably be conditional, based on the values stored at that point within the flag register.
For greater ease, and as describing all the possible instructions:
Mnemonic Description
MOV Moves a data value from one location to another
ADD Adds to data values using the ALU, and returns the result to the accumulator
STO Stores the contents of the accumulator in the specified location
END Marks the end of the program in memory

Related Discussions:- what is Decode or execution cycle?

If staement, if statement with explanation

if statement with explanation

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Knowledge of the environment of ai system, Knowledge of the Environment ...

Knowledge of the Environment We must distinguish between knowledge an agent receives through it's sensors and knowledge about the world from which the input comes. Knowledge a

Computer architecture, #formular for calculating speed up factor fo super s...

#formular for calculating speed up factor fo super scalar architecture, super pipeline architecture and VLIW with m different functional units.

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Explain the important concepts of modern cpu, Question 1 Explain the impor...

Question 1 Explain the important concepts of modern CPU CISC vs. RISC CPUs Circuit Size and Die Size Processor Speed Processor Cooling System Clocks Architect

Explain distributed file systems, Question 1 Write short note on          ...

Question 1 Write short note on                             1) NFS 2) CIFS Question 2 What is Virtual Application? Write down the benefits and drawbacks of it Questi

Explain the configuration steps involved in cmos setup, Question 1 Explain...

Question 1 Explain the important concepts of modern CPU Question 2 Discuss the instructions that need to follow while installing new mother board Question 3 Explai

Flow decomposition technique to list the cycles, QUESTION (a) Consider ...

QUESTION (a) Consider the graph below, use the Flow Decomposition technique to list the cycles and paths produced.                                                (b) Pr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd