Question

(a) The control unit (CU) in the central processing unit (CPU) controls the data flow and operations in the CPU. Explain...

(a) The control unit (CU) in the central processing unit (CPU) controls the data flow and operations in the CPU.

Explain the difference between the two methods used for designing the control unit. [6 marks]

(b) Explain the difference between the direct and indirect addressing moods. [4 marks]

(c) Explain how an instruction is fetched in the fetch decode execute cycle. [5 marks]

(d) What is the difference between a 16-bit microprocessor and 32-bit Pentium microprocessors?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Ans (a) :- Control unit tells how to respond to the instructions that are sent to the processor. It generates control signal by fetching instruction from the main memory to the computer register. It converts input information to control signals. It receives control signals from other devices.

Ans (b) :-

Direct Addressing mode :- In direct Addressing actual address of the operand is used. The instruction is direct address if the address part of the operand has the direct address. The memory access is faster.

Indirect addressing mode :- Where the address of the operand is contained in a register pair then that mode is indirect addressing mode. The memory access is slower than direct addressing mode and the address space is large.

Ans (c) :- Executing programs using fetch decode execute cycle is the CPUs main job. Each machine code instruction in a program takes up a slot in main memory and every slot has a memory address. Then address of each instruction is stored by Program Counter and in which path it should be carried out is viewed. Then while executing CPU performs fetch decode execute cycle.

Ans (d) :-

16-bit microprocessor :- Transferring 16-bits of data at a time capable by a 16-bit hardware or software devices meaning they are capable of working with 16-bit binary numbers.

32-bit pentium microprocessor :- Pentium is a brand used in 86 architecture microprocessor where 32-bits of data is transferred at a time.

Add a comment
Know the answer?
Add Answer to:
(a) The control unit (CU) in the central processing unit (CPU) controls the data flow and operations in the CPU. Explain...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 20 pts] 2- Consider the internal structure of the pseudo-CPU discussed in class augmented with a...

    20 pts] 2- Consider the internal structure of the pseudo-CPU discussed in class augmented with a single-port register file (i.e., only one register value can be read at a time) containing 32 8-bit registers (RO-R31) and a Stack Pointer (SP). Suppose the pseudo-CPU can be used to implement the AVR instruction ICALL (Indirect Call to Subroutine) with the format shown below: 10001 10101 00001 10011 ICALL pushes the return address onto the stack and jumps to the 16-bit target address...

  • CASE II AziTech is considering the design of a new CPU for its new model of...

    CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosing between two (2) CPU (CPUA and CPUB) implementations based on their performance. Both CPU are expected to have the same instruction set architecture. CPUA has a clock cycle time of 60 ns and CPUB has a clock cycle time of 75 ns. The same number of a particular instruction type is expected to be executed on...

  • 1. Distinguish between control processing unit (CPU), core and processor. 2. Briefly explain how short-I/O-wait interrupt...

    1. Distinguish between control processing unit (CPU), core and processor. 2. Briefly explain how short-I/O-wait interrupt can improve the exexution of user program 3. What is the relationship between: (i) the width of address bus and the memory capacity (ii) the width of data bust and the data transfer

  • 26. The is a group of bits that tells the computer to perform a specific operation...

    26. The is a group of bits that tells the computer to perform a specific operation A). program counter B). Opcode C). register D). microoperation 27. A condition called occurs in unsigned binary representation of a number when the result of an arithmetic operation is outside the range of allowable precision for the given number of bits. A). underflow B). 2's complement C). overflow D) bitwise complement 28. An iteration of the fetch-decode-execute cycle includes which of the following events?...

  • computer analysis

    Questions1.  The function L is defined as L(1) = 2,L(2) = 1,L(3) = 3,L(4) = 4 and for n ≥ 4,L(n + 1) = L(n) + L(n − 1) + L(n − 2)L(n − 3)i.e., the (n + 1)-th value is given by the sum of the n-th, n − 1-th and n − 2-th values divided by the n − 3-th value.(a)  Write an assembly program for computing the k-th value L(k), where k is an integer bigger than...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • The Fibonacci sequence F is defined as F(1) = F(2) = 1 and for n>= 2,...

    The Fibonacci sequence F is defined as F(1) = F(2) = 1 and for n>= 2, F(n + 1) = F(n) + F(n − 1) i.e., the (n + 1)th value is given by the sum of the nth value and the (n − 1)th value. 1. Write an assembly program typical of RISC machines for computing the kth value F(k), where k is a natural number greater than 2 loaded from a memory location M, and storing the result...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT