
Concept explainers
1.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
1.

Explanation of Solution
Simple instructions averaging one clock to execute:
Simple instructions averaging one clock for execution is suitable for RISC because the instruction related to RISC machines are easy to understand and implement. They include hardwired control to execute the instructions in one clock cycle.
2.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
2.

Explanation of Solution
Single register set:
Single register set is suitable for CISC because different types of registers can be controlled using the register windows. The register windows are overlapped and shifted from one register to another register and includes partitions like global registers, local registers and input and output registers.
3.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
3.

Explanation of Solution
Complexity is in the compiler:
Complexity is in the complier is suitable for RISC because rather than microcode inter processor, compiler efficiency is compared for checking the quality of the RISC machines.
4.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
4.

Explanation of Solution
Highly pipelined:
Highly pipelined is suitable for RISC because the instruction pipelining is done by using microcode pipelining including many factors like data dependency.
5.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
5.

Explanation of Solution
Any instruction can reference memory:
Any instruction can be used as reference memory is suitable for CISC because the instructions related to CISC are difficult to understand and implement and can access the memory directly.
6.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
6.

Explanation of Solution
Instructions are interpreted by the micro-program:
Instructions are interpreted by using the micro-processor is suitable for CISC because the microcode efficiency is used for controlling the execution of instruction and calculating its difficulty.
7.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
7.

Explanation of Solution
Fixed length, easily decode instruction format:
Fixed length and easily decoded instruction format are suitable for RISC because the fixed length instructions present in RISC machines can be executed using minimum number of clock cycles. The difficulty of the instructions depends on the hardware used and hence they can be decoded easily.
8.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
8.

Explanation of Solution
Highly specialized, infrequently used instructions:
Highly specialized and instructions used infrequently are suitable for CISC because the instructions related to the CISC architecture includes high complexity and hence the instructions are specialized and used for specialized reasons.
9.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
9.

Explanation of Solution
Use of overlapping registers windows:
Using the overlapping register windows is suitable for RISC because the registers related to RISC architecture include high efficiency and performance with modularization technique.
10.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
10.

Explanation of Solution
Relatively few addressing modes:
Relatively few addressing modes is suitable for RISC because the RISC architecture includes five number of addressing nodes which helps in calculating the memory location of address related to the instructions.
Want to see more full solutions like this?
Chapter 9 Solutions
Essentials of Computer Organization and Architecture
- Outline the overall steps for configuring and securing Linux servers Consider and describe how a mixed Operating System environment will affect what you have to do to protect the company assets Describe at least three technologies that will help to protect CIA of data on Linux systemsarrow_forwardNode.js, Express, Nunjucks, MongoDB, and Mongoose There are a couple of programs similar to this assignment given in the lecture notes for the week that discusses CRUD operations. Specifically, the Admin example and the CIT301 example both have index.js code and nunjucks code similar to this assignment. You may find some of the other example programs useful as well. It would ultimately save you time if you have already studied these programs before giving this assignment a shot. Either way, hopefully you'll start early and you've kept to the schedule in terms of reading the lecture notes. You will need to create a database named travel using compass, then create a collection named trips. Use these names; your code must work with my database. The trips documents should then be imported unto the trips collection by importing the JSON file containing all the data as linked below. The file itself is named trips.json, and is available on the course website in the same folder as this…arrow_forwardusing r languagearrow_forward
- using r languagearrow_forwardusing r languagearrow_forwardWrite a short paper (1 page/about 500 words) summarizing what we as System Admins can do to protect the CIA of our servers. Outline the overall steps for configuring and securing Linux servers Consider and describe how a mixed Operating System environment will affect what you have to do to protect the company assets Describe at least three technologies that will help to protect CIA of data on Linux systems Required Resourcesarrow_forward
- using r language Estimate the MSE of the level k trimmed means for random samples of size 20 generated from a standard Cauchy distribution. (The target parameter θis the center or median; the expected value does not exist.) Summarize the estimates of MSE in a table for k= 1,2,...,9arrow_forwardusing r language Estimate the MSE of the level k trimmed means for random samples of size 20 generated from a standard Cauchy distribution. (The target parameter θis the center or median; the expected value does not exist.) Summarize the estimates of MSE in a table for k= 1,2,...,9arrow_forwardusing r language The data law82 in bootstrap library contains LSAT and GPA for 82 law schools. Compute a 95% bootstrap t confidence interval estimates for the correlation statisticsarrow_forward
- using r language The data law82 in bootstrap library contains LSAT and GPA for 82 law schools. Compute a 95% bootstrap t confidence interval estimates for the correlation statisticsarrow_forwardusing r langauge The data law82 in bootstrap library contains LSAT and GPA for 82 law schools. Compute and compare the three 95% bootstrap confidence interval estimates for the correlation statistics.arrow_forwardWhat is the number of derangements of size k from the set {1,2,...n} to the set {1,2,...n} so that f(x) != x exactly k times with 1 <= k <= narrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





