Essentials of Computer Organization and Architecture
Essentials of Computer Organization and Architecture
4th Edition
ISBN: 9781284074482
Author: Linda Null, Julia Lobur
Publisher: Jones & Bartlett Learning
bartleby

Concept explainers

Question
Book Icon
Chapter 9, Problem 33E

1.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

1.

Expert Solution
Check Mark

Explanation of Solution

Simple instructions averaging one clock to execute:

Simple instructions averaging one clock for execution is suitable for RISC because the instruction related to RISC machines are easy to understand and implement. They include hardwired control to execute the instructions in one clock cycle.

2.

Program Plan Intro

Complex Instruction Set Computer (CISC):

  • Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
  • As the length of the instructions increases, the processing time also increases.

2.

Expert Solution
Check Mark

Explanation of Solution

Single register set:

Single register set is suitable for CISC because different types of registers can be controlled using the register windows. The register windows are overlapped and shifted from one register to another register and includes partitions like global registers, local registers and input and output registers.

3.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

3.

Expert Solution
Check Mark

Explanation of Solution

Complexity is in the compiler:

Complexity is in the complier is suitable for RISC because rather than microcode inter processor, compiler efficiency is compared for checking the quality of the RISC machines.

4.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

4.

Expert Solution
Check Mark

Explanation of Solution

Highly pipelined:

Highly pipelined is suitable for RISC because the instruction pipelining is done by using microcode pipelining including many factors like data dependency.

5.

Program Plan Intro

Complex Instruction Set Computer (CISC):

  • Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
  • As the length of the instructions increases, the processing time also increases.

5.

Expert Solution
Check Mark

Explanation of Solution

Any instruction can reference memory:

Any instruction can be used as reference memory is suitable for CISC because the instructions related to CISC are difficult to understand and implement and can access the memory directly.

6.

Program Plan Intro

Complex Instruction Set Computer (CISC):

  • Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
  • As the length of the instructions increases, the processing time also increases.

6.

Expert Solution
Check Mark

Explanation of Solution

Instructions are interpreted by the micro-program:

Instructions are interpreted by using the micro-processor is suitable for CISC because the microcode efficiency is used for controlling the execution of instruction and calculating its difficulty.

7.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

7.

Expert Solution
Check Mark

Explanation of Solution

Fixed length, easily decode instruction format:

Fixed length and easily decoded instruction format are suitable for RISC because the fixed length instructions present in RISC machines can be executed using minimum number of clock cycles. The difficulty of the instructions depends on the hardware used and hence they can be decoded easily.

8.

Program Plan Intro

Complex Instruction Set Computer (CISC):

  • Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
  • As the length of the instructions increases, the processing time also increases.

8.

Expert Solution
Check Mark

Explanation of Solution

Highly specialized, infrequently used instructions:

Highly specialized and instructions used infrequently are suitable for CISC because the instructions related to the CISC architecture includes high complexity and hence the instructions are specialized and used for specialized reasons.

9.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

9.

Expert Solution
Check Mark

Explanation of Solution

Use of overlapping registers windows:

Using the overlapping register windows is suitable for RISC because the registers related to RISC architecture include high efficiency and performance with modularization technique.

10.

Program Plan Intro

Reduced Instruction Set Computer (RISC):

  • In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
  • As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
  • It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.

10.

Expert Solution
Check Mark

Explanation of Solution

Relatively few addressing modes:

Relatively few addressing modes is suitable for RISC because the RISC architecture includes five number of addressing nodes which helps in calculating the memory location of address related to the instructions.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
This battle room is focused on entry level tasks for a network analyst where you will be given trials and reconnaissance, sensor tuning, log aggregation, SIEM queries, and network analysis.   For this week’s project, complete the following tasks:   From your Project Ares portal, LOG IN Click on LAUNCH GAME. Select the region NORTH AMERICA Click on Battle School Under the BATTLE SCHOOL pop-up window, click on START TRAINING. Under the BATTLE ROOMS tile, click on ENTER. Under the NETWORK ANALYST tile, click on PLAY. Wait for the Battle Room to load. While loading, the BATTLE ROOM button will display red. Once the Battle Room is loaded, the BATTLE ROOM button will turn yellow and the center of the disk display will indicate CONNECTED. Click on the BATTLE ROOM button to enter the Battle Room. Below the TASKS folder, make sure you click on INSTRUCTIONS to download the Network Analyst Fundamentals material. In the Battle Room, under the TASKS menu select task INTRUSION DETECTION. Complete…
Create a relationship between the common field (Technician Number) of the two tables. Make sure that each client must have 1 and only 1 technician assigned, and each technician can have multiple clients. 2. Create a query to show the Client Number, Client Name, Billed, Paid for clients in Anderson city. Save the query. 3. Create a query to show the Technician Number, Last Name, First Name, YTD Earnings for technicians whose Hourly Rate is greater than or equal to 30. Save the query. 4. Create a query to show Client Number, Client Name, Billed, Paid for clients whose technician number is 22 and whose Billed is over 300. Save the query. 5. Create a query to show the Technician Number, Last Name, First Name, Client Number, Client Name for clients whose technician number 23. Save the query. 6. Create a query to show the Technician Number, Last Name, First Name, Client Number, Client Name for clients whose technician number 23 or 29. Save the query Help please Microsoft office access
Dijkstra's Algorithm (part 1).  Consider the network shown below, and Dijkstra’s link-state algorithm. Here, we are interested in computing the least cost path from node E (note: the start node here is E) to all other nodes using Dijkstra's algorithm. Using the algorithm statement used in the textbook and its visual representation, complete the "Step 0" row in the table below showing the link state algorithm’s execution by matching the table entries (i), (ii), (iii), and (iv) with their values.  Write down your final [correct] answer, as you‘ll need it for the next question.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education