Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q Why we use addressing schemes?
An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register. Operands can be specified in one of the 3 basic forms which are register, immediate and memory.
Though, why addressing schemes? The question of addressing is connected with how operands are interpreted. We can say in other wordsthat the term "addressing schemes" refers to techniqueused for specifying operands. There are a multitude of instruction formats and addressing schemes. Selecting which schemes are available will affect not only the ease to write compiler but will also consider how efficient the architecture can be?
All computers use more than one addressing schemes to provide programming flexibility to user by offering facilities likeloop control,pointers to memory, indexing of data and program relocation as well as to decrease the number of bits in operand field of instruction. Providing a variety of addressing modes can help decrease instruction counts though having more modes also raises the complexity of machine and in turn can raise the average Cycles per Instruction (CPI). Before we discuss the addressing modes let's consider the notations being used in this section. In description which follows the symbols A, A1, A2 ...... etc. indicate the content of an operand field. So Ai may refer to a memory address or data. In case operand field is a register address then symbols R, R1, R2,... etc., are used. If C indicates the contents (either of an operand field or a register or of a memory location) then (C) indicates the content of the memory location whose address is C.
Difference between data warehousing and data mining The difference between data warehousing and data mining is that data warehousing shows to the data storage while data mining
What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv
Explain the Acceptance and Request Determination As we have learned, much of the overhead in client-server interaction occurs in the CSInteface, either client or server. It is
Q What is Cable Modem? One more way of accessing Internet currently being developed is use of cable modems. These require that you subscribe to a cable service as well as allow
Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b
Distinguish between PAL and PLA
Computer Organization and Architecture 1. Draw the block diagram of von Neumann Architecture and describe about its parts in brief. 2. Draw block diagram of Intel 8085 CPU o
Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:
Write an implementation for the Prime machine (de?ned at the end of the assignment sheet). Provide a suitable invariant and variant for any loop you use. Provide comments in your m
Assembler: Typically a modern assembler makes object code by translating assembly instruction into op codes, & by resolving symbolic names for memory locations and any other e
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd