Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q Why we use addressing schemes?
An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register. Operands can be specified in one of the 3 basic forms which are register, immediate and memory.
Though, why addressing schemes? The question of addressing is connected with how operands are interpreted. We can say in other wordsthat the term "addressing schemes" refers to techniqueused for specifying operands. There are a multitude of instruction formats and addressing schemes. Selecting which schemes are available will affect not only the ease to write compiler but will also consider how efficient the architecture can be?
All computers use more than one addressing schemes to provide programming flexibility to user by offering facilities likeloop control,pointers to memory, indexing of data and program relocation as well as to decrease the number of bits in operand field of instruction. Providing a variety of addressing modes can help decrease instruction counts though having more modes also raises the complexity of machine and in turn can raise the average Cycles per Instruction (CPI). Before we discuss the addressing modes let's consider the notations being used in this section. In description which follows the symbols A, A1, A2 ...... etc. indicate the content of an operand field. So Ai may refer to a memory address or data. In case operand field is a register address then symbols R, R1, R2,... etc., are used. If C indicates the contents (either of an operand field or a register or of a memory location) then (C) indicates the content of the memory location whose address is C.
WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i wrongly gets the n
What is a Data Class? The Data class verifies in which table space the table is stored when it is formed in the database
How is a property designated as read-only? In VB.NET: Public Read-Only Property Property Name As Return Type Get? Your Property execution goes in here End Get End Property.
Explain E-mail gateways. Email using SMTP works better while both the sender and the receiver are on the Internet and can support TCP connections among sender and receiver. Tho
Define Radix (or)Base. A number system of base or radix is a system that uses different symbols for r digits. Numbers are shown by a string of digit symbols. To verify the quan
If a programmer doesn't wish to make modifies to the document he can lock the document data and its code from more changes by changing the extension of the file system to .MDE. Cha
Write about TSR TPA also holds TSR (terminate and stay resident) programs which remain in memory in an active state until activated by a hot-key sequence or another event like
Explain inter process communication
What is slack? 'Slack' is the amount of time you have which is measured through while an event ‘really happens' and while it ‘should happen’. The term ‘really happens' can a
Explain POP (Post Office Protocol). The Post Office Protocol gives remote access to an electronic mail box. The protocol permits a user's mailbox to reside on a computer which
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd