Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem: Suppose that the meaning of the BUN instruction of the Basic Computer is changed to implement the relative addressing mode, that is, PC <- PC + AR instead of PC<- AR.

a) prepare an optimal operation sequence to implement the new version, but make sure that the value of AC is not changed at the end of your implementation.

b) Is it possible to prepare an operation sequence to implement the new version such that, at the end of the implementation, the values AC and DR are unchanged? If yes, prepare such an optimal sequence. Otherwise justify why it is not possible.

problem: prepare an optimal sequence of control microinstruction to implement the following register transfer:

x: AR<- AR +DR,  DR <- DR + 1

Your solution should use the minimum number of cycles and it should leave AC unchanged: You may assume that AC contains an 11-bit quantity.

problem: Archie Tecture has to prepare Basic Computer code that contains lots of "spinning loops" of the form:

Loop: ISZ A
BUN loop
Other code….

He believes that all his "spinning loops" will run faster if he re-implements them once he makes the following changes to the basic computer.

-Add a register to the bus system CTR (count register) to be selected with S1= 0

-Replace the ISZ instruction with an instruction that loads a value into CTR:

LDC Address            CTR<- M[Address]

- Add a register reference instruction ICSZ with the semantics: Increment CTR and skip next instruction if zero.

Answer the following:

a) Using as a model table 5-6, prepare the register transfer statements for the new instruction ICSZ and LDC.

b) Is Archie correct assuming that all his "spinning loops" will run faster once he reimplements them using the next instruction? Justify carefully your answer.

problem: Most machines have a shift left unit attached to the ALU. Using 4x1multiplexors and D-flip-flops, design a 4-bit shifter that accommodates these four operations: no shift, Circular shift left, logical shift right, and Circular shift right. The most significant bit is the sign bit.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9259

Have any Question? 


Related Questions in Computer Engineering

Your company is debating transferring all of their

Your company is debating transferring all of their information to a Cloud storage provider. The CFO feels this move is a big cash savings plan, one that could save the company a lot of money. The CIO feels the risk is to ...

The autocorrelation array of a 4 x 1 zero mean vector u is

The autocorrelation array of a 4 x 1 zero mean vector u is given by a. What is the KL transform of u? b. Compare the basis vectors of the KL transform with the basis vectors of the 4 x 4 unitary DFf, OCT, DST, Hadamard, ...

Consider a finite tree of depth d and branching factor b a

Consider a finite tree of depth d and branching factor b. (A tree consisting of only a root node has depth zero; a tree consisting of a root node and its It successors has depth 1; etc.) Suppose the shallowest goal node ...

In this assignment you will model the game of bulgarian

In this assignment, you will model the game of Bulgarian Solitaire. The game starts with 45 cards. (They need not be playing cards. Unmarked index cards work just as well.) Randomly divide them into some number of piles ...

Using the internet in figure 111 chapter 1 in the text show

Using the internet in Figure 1.11 (Chapter 1) in the text, show the layers of the TCP/IP protocol suite and the flow of data when two hosts, one on the west coast and the other on the east coast, exchange messages.

System reference guide - diagrammingyou have been called

System Reference Guide - Diagramming You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. As a contin ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

Coursemultimedia systems developmentquestionsq1 identify

Course: (Multimedia Systems Development) Questions: Q.1 Identify and explain the three major interrelated tasks for creating 3-D animation. Q.2 Identify and explain the advantages of sampled sound and synthesized sound. ...

Verify that eulers theorem holds in zm m 69 for all

Verify that Euler's Theorem holds in Zm, m = 6,9, for all elements a for which gcd(a,m) = 1. Also verify that the theorem does not hold for elements a for which gcd(a,m) ≠ 1. For the affine cipher in Chapter 1 the multip ...

Accountingjeffersoncountyairport handles several daily

ACCOUNTING JeffersonCountyAirport handles several daily commuter flights and many private flights. The county budget officer has compiled the following data regarding airport costs and activity over the past year. Requir ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro