All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
systems analysis and design
Questions and Answers of
Systems Analysis And Design
To get some feel for the effects of denormalization and gradual underflow, consider a decimal system that provides 6 decimal digits for the significand and for which the smallest normalized number is
Show how the following floating-point additions are performed (where significands are truncated to 4 decimal digits). Show the results in normalized form. a. 5.566 × 102 + 7.777 × 102 b. 3.344 ×
Show how the following floating-point subtractions are performed (where significands are truncated to 4 decimal digits). Show the results in normalized form. a. 7.744 × 10-3 - 6.666 × 10-3 b. 8.844
Add columns to Table 9.1 for sign magnitude and ones complement.
Show how the following floating-point calculations are performed (where significands are truncated to 4 decimal digits). Show the results in normalized form. a. (2.255 × 101) × (1.234 × 100) b.
In Section 9.3, the twos complement operation is defined as follows. To find the twos complement of X, take the Boolean complement of each bit of X, and then add 1. a. Show that the following is an
Calculate (72530 - 13250) using tens complement arithmetic. Assume rules similar to those for twos complement arithmetic.
Consider the twos complement addition of two n-bit numbers:zn-1zn-2 ... z0 = xn-1xn-2 ... x0 + yn-1yn-2 ... y0Assume that bitwise addition is performed with a carry bit ci generated by the addition
What are the typical elements of a machine instruction?
What is the difference between big endian and little endian?
List and briefly explain five important instruction set design issues.
What is the relationship between the IRA character code and the packed decimal representation?
What is the difference between an arithmetic shift and a logical shift?
Why are transfer of control instructions needed?
List and briefly explain two common ways of generating the condition to be tested in a conditional branch instruction.
Suppose a stack is to be used by the processor to manage procedure calls and returns. Can the program counter be eliminated by using the top of the stack as a program counter? Discuss.
The x86 architecture includes an instruction called Decimal Adjust after Addition (DAA).DAA performs the following sequence of instructions: if ((AL AND 0FH) >9) OR (AF = 1) then AL ← AL + 6; AF
The x86 Compare instruction (CMP) subtracts the source operand from the destination operand; it updates the status flags (C, P, A, Z, S, O) but does not alter either of the operands. The CMP
Suppose we wished to apply the x86 CMP instruction to 32-bit operands that contained numbers in a floating-point format. For correct results, what requirements have to be met in the following
Many microprocessor instruction sets include an instruction that tests a condition and sets a destination operand if the condition is true. Examples include the SETcc on the x86, the Scc on the
Suppose that two registers contain the following hexadecimal values: AB0890C2, 4598EE50.What is the result of adding them using MMX instructions: a. For packed byte b. For packed word Assume
Convert the following formulas from reverse Polish to infix: a. AB + C + D × b. AB/CD/ + c. ABCDE + ××/ d. ABCDE + F/ + G - H/ ×+
Convert the following formulas from infix to reverse Polish: a. A + B + C + D + E h. (A + B) × (C + D) + E c. (A × B) + (C × D) + E d. (A - B) × (((C - D × E)/F)/G) × H
For each of the following packed decimal numbers, show the decimal value: a. 0111 0011 0000 1001 b. 0101 1000 0010 c. 0100 1010 0110
Using the algorithm for converting infix to postfix defined in Appendix 10A, show the steps involved in converting the expression of Figure 10.15 into postfix. Use a presentation similar to Figure
Show the calculation of the expression in Figure 10.17, using a presentation similar to Figure 10.16.
Redraw the little-endian layout in Figure 10.18 so that the bytes appear as numbered in the big-endian layout. That is, show memory in 64-bit rows, with the bytes listed left to right, top to bottom.
For the following data structures, draw the big-endian and little-endian layouts, using the format of Figure 10.18, and comment on the results. a. struct { double i; //0x1112131415161718 } s1; b.
The IBM Power architecture specification does not dictate how a processor should implement little-endian mode. It specifies only the view of memory a processor must have when operating in
Write a small program to determine the endianness of machine and report the results. Run the program on a computer available to you and turn in the output.
Most, but not all, processors use big- or little-endian bit ordering within a byte that is consistent with big- or little-endian ordering of bytes within a multibyte scalar. Let us consider the
A given microprocessor has words of 1 byte. What is the smallest and largest integer that can be represented in the following representations: a. Unsigned b. Sign-magnitude c. Ones complement d. Twos
Many processors provide logic for performing arithmetic on packed decimal numbers. Although the rules for decimal arithmetic are similar to those for binary operations, the decimal results may
The tens complement of the decimal number X is defined to be 10N - X, where N is the number of decimal digits in the number. Describe the use of ten's complement representation to perform decimal
Compare zero-, one-, two-, and three-address machines by writing programs to computeX = (A + B Ã C) / (D - E Ã F)for each of the four machines. The instructions available
Consider a hypothetical computer with an instruction set of only two n-bit instructions. The first bit specifies the opcode, and the remaining bits specify one of the 2n-1 n-bit words of main memory.
Many instruction sets contain the instruction NOOP, meaning no operation, which has no effect on the processor state other than incrementing the program counter. Suggest some uses of this instruction.
In Section 10.4, it was stated that both an arithmetic left shift and a logical left shift correspond to a multiplication by 2 when there is no overflow, and if overflow occurs, arithmetic and
What facts go into determining the use of the addressing bits of an instruction?
What are the advantages and disadvantages of using a variable-length instruction format?
Briefly define displacement addressing.
What is the advantage of auto indexing?
What is the difference between post indexing and pre indexing?
Given the following memory values and a one-address machine with an accumulator, what values do the following instructions load into the accumulator? • Word 20 contains 40. • Word 30 contains
The x86 includes the following instruction: IMUL op1, op2, immediate This instruction multiplies op2, which may be either register or memory, by the immediate operand value, and places the result in
Define: EA = (X)+ is the effective address equal to the contents of location X, with X incremented by one word length after the effective address is calculated; is the effective address equal to the
Assume a stack-oriented processor that includes the stack operations PUSH and POP. Arithmetic operations automatically involve the top one or two stack elements. Begin with an empty stack. What stack
Why was IBM's decision to move from 36 bits to 32 bits per word wrenching, and to whom?
Assume an instruction set that uses a fixed 16-bit instruction length. Operand specifiers are 6 bits in length. There are K two-operand instructions and L zero-operand instructions. What is the
Design a variable-length opcode to allow all of the following to be encoded in a 36-bit instruction: • Instructions with two 15-bit addresses and one 3-bit register number • Instructions with one
Consider the results of Problem 10.6. Assume that M is a 16-bit memory address and that X, Y, and Z are either 16-bit addresses or 4-bit register numbers. The one-address machine uses an accumulator,
Is there any possible justification for an instruction with two opcodes?
Let the address stored in the program counter be designated by the symbol X1. The instruction stored in X1 has an address part (operand reference) X2. The operand needed to execute the instruction is
The 16-bit Zilog Z8001 has the following general instruction format:The mode field specifies how to locate the operands from the operand fields. The w/b field is used in certain instructions to
An address field in an instruction contains decimal value 14. Where is the corresponding operand located for a. Immediate addressing? b. Direct addressing? c. Indirect addressing? d. Register
Consider a 16-bit processor in which the following appears in main memory, starting at location 200:The first part of the first word indicates that this instruction loads a value into an accumulator.
A PC-relative mode branch instruction is 3 bytes long. The address of the instruction, in decimal, is 256028. Determine the branch target address if the signed displacement in the instruction is -31.
A PC-relative mode branch instruction is stored in memory at address 62010. The branch is made to location 53010.The address field in the instruction is 10 bits long. What is the binary value in the
In [COOK82], the author proposes that the PC-relative addressing modes be eliminated in favor of other modes, such as the use of a stack. What is the disadvantage of this proposal?
What general roles are performed by processor registers?
What is the function of condition codes?
What is a program status word?
Why is a two-stage instruction pipeline unlikely to cut the instruction cycle time in half, compared with the use of no pipeline?
List and briefly explain various ways in which an instruction pipeline can deal with conditional branch instructions.
How are history bits used for branch prediction?
a. If the last operation performed on a computer with an 8-bit word was an addition in which the two operands were 00000010 and 00000011, what would be the value of the following flags? • Carry •
A non pipelined processor has a clock rate of 2.5 GHz and an average CPI (cycles per instruction) of 4. An upgrade to the processor introduces a five-stage pipeline. However, due to internal pipeline
Consider an instruction sequence of length n that is streaming through the instruction pipeline. Let p be the probability of encountering a conditional or unconditional branch instruction, and let q
One limitation of the multiple-stream approach to dealing with branches in a pipeline is that additional branches will be encountered before the first branch is resolved. Suggest two additional
Consider the state diagrams of Figure 12.28.a. Describe the behavior of each.b. Compare these with the branch prediction state diagram in Section 12.4. Discuss the relative merits of each of the
The Motorola 680x0 machines include the instruction Decrement and Branch According to Condition, which has the following form: DBcc Dn, displacement where cc is one of the testable conditions, Dn is
Redraw Figures 12.19c, assuming that the conditional branch is not taken.Figure 12.19 Branch Prediction State Diagram
Table 12.5 summarizes statistics from [MACD84] concerning branch behavior for various classes of applications. With the exception of type 1 branch behavior, there is no noticeable difference among
Pipelining can be applied within the ALU to speed up floating-point operations. Consider the case of floating-point addition and subtraction. In simplified terms, the pipeline could have four stages:
Repeat Problem 12.1 for the operation A B, where A contains 11110000 and B contains 0010100.
A microprocessor provides an instruction capable of moving a string of bytes from one area of memory to another. The fetching and initial decoding of the instruction takes 10 clock cycles.
Assume an 8088 is executing a program in which the probability of a program jump is 0.1. For simplicity, assume that all instructions are 2 bytes long. a. What fraction of instruction fetch bus
Consider the timing diagram of Figures 12.10. Assume that there is only a two-stage pipeline (fetch, execute). Redraw the diagram to show how many time units are now needed for four
Assume a pipeline with four stages: fetch instruction (FI), decode instruction and calculate addresses (DA), fetch operand (FO), and execute (EX). Draw a diagram similar to Figures 12.10 for a
A pipelined processor has a clock rate of 2.5 GHz and executes a program with 1.5 million instructions. The pipeline has five stages, and instructions are issued at a rate of one per clock cycle.
What are some typical distinguishing characteristics of RISC organization?
Briefly explain the two basic approaches used to minimize register-memory operations on RISC machines.
If a circular register buffer is used to handle local variables for nested procedures, describe two approaches for handling global variables.
Considering the call-return pattern, how many overflows and underflows (each of which causes a register save/restore) will occur with a window size of a. 5? b. 8? c. 16?
SPARC is lacking a number of instructions commonly found on CISC machines. Some of these are easily simulated using either register R0, which is always set to 0, or a constant operand. These
Consider the following code fragment:if K > 10L: = K + 1elseL: = K - 1;A straightforward translation of this statement into SPARC assembler could take the following form:The code contains a nop after
We wish to determine the execution time for a given program using the various pipelining schemes discussed in Section 13.5. Let N = number of executed instructions D = number of memory accesses J =
Reorganize the code sequence in Figure 13.6d to reduce the number of NOOPs.Figure 13.6d
Consider the following code fragment in a high-level language:Assume that Q is an array of 32-byte records and the VAL field is in the first 4 bytes of each record. Using x86 code, we can compile
Consider the following loop:S: = 0;for K: = 1 to 100 doS: = S - K;A straightforward translation of this into a generic assembly language would look something like this:A compiler for a RISC machine
A RISC machine may do both a mapping of symbolic registers to actual registers and a rearrangement of instructions for pipeline efficiency. An interesting question arises as to the order in which
Add entries for the following processors to Table 13.7:Table 13.7 Characteristics of Some Processorsa. Pentium IIb. ARM
In many cases, common machine instructions that are not listed as part of the MIPS instruction set can be synthesized with a single MIPS instruction. Show this for the following: a.
What is the essential characteristic of the superscalar approach to processor design?
What is the difference between the superscalar and super pipelined approaches?
Briefly define the following terms: • True data dependency • Procedural dependency • Resource conflicts • Output dependency • Ant dependency
What is the distinction between instruction-level parallelism and machine parallelism?
List and briefly define three types of superscalar instruction issue policies.
What is register renaming and what is its purpose?
What are the key elements of a superscalar processor organization?
Showing 2500 - 2600
of 3387
First
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Last