![Essentials of Computer Organization and Architecture](https://www.bartleby.com/isbn_cover_images/9781284123036/9781284123036_largeCoverImage.gif)
Concept explainers
1.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
1.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Simple instructions averaging one clock to execute:
Simple instructions averaging one clock for execution is suitable for RISC because the instruction related to RISC machines are easy to understand and implement. They include hardwired control to execute the instructions in one clock cycle.
2.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
2.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Single register set:
Single register set is suitable for CISC because different types of registers can be controlled using the register windows. The register windows are overlapped and shifted from one register to another register and includes partitions like global registers, local registers and input and output registers.
3.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
3.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Complexity is in the compiler:
Complexity is in the complier is suitable for RISC because rather than microcode inter processor, compiler efficiency is compared for checking the quality of the RISC machines.
4.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
4.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Highly pipelined:
Highly pipelined is suitable for RISC because the instruction pipelining is done by using microcode pipelining including many factors like data dependency.
5.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
5.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Any instruction can reference memory:
Any instruction can be used as reference memory is suitable for CISC because the instructions related to CISC are difficult to understand and implement and can access the memory directly.
6.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
6.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Instructions are interpreted by the micro-program:
Instructions are interpreted by using the micro-processor is suitable for CISC because the microcode efficiency is used for controlling the execution of instruction and calculating its difficulty.
7.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
7.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Fixed length, easily decode instruction format:
Fixed length and easily decoded instruction format are suitable for RISC because the fixed length instructions present in RISC machines can be executed using minimum number of clock cycles. The difficulty of the instructions depends on the hardware used and hence they can be decoded easily.
8.
Complex Instruction Set Computer (CISC):
- Complex instruction set computing uses the variable length instructions and accesses memory directly and efficiently.
- As the length of the instructions increases, the processing time also increases.
8.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Highly specialized, infrequently used instructions:
Highly specialized and instructions used infrequently are suitable for CISC because the instructions related to the CISC architecture includes high complexity and hence the instructions are specialized and used for specialized reasons.
9.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
9.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Use of overlapping registers windows:
Using the overlapping register windows is suitable for RISC because the registers related to RISC architecture include high efficiency and performance with modularization technique.
10.
Reduced Instruction Set Computer (RISC):
- In this computer, the Instruction Set Architecture (ISA) allows lesser number of Cycles Per Instruction (CPI) when compared to Complex Instruction Set Computer.
- As this contains a simple and general set of instructions, it is also called as “Relegate interesting stuff to the Compiler”.
- It also has another trait and that is the load/store architecture, in which the memory is accessed through specific instructions rather than as a part of most instructions.
10.
![Check Mark](/static/check-mark.png)
Explanation of Solution
Relatively few addressing modes:
Relatively few addressing modes is suitable for RISC because the RISC architecture includes five number of addressing nodes which helps in calculating the memory location of address related to the instructions.
Want to see more full solutions like this?
Chapter 9 Solutions
Essentials of Computer Organization and Architecture
- D. S. Malik, Data Structures Using C++, 2nd Edition, 2010arrow_forwardMethods (Ch6) - Review 1. (The MyRoot method) Below is a manual implementation of the Math.sqrt() method in Java. There are two methods, method #1 which calculates the square root for positive integers, and method #2, which calculates the square root of positive doubles (also works for integers). public class SquareRoot { public static void main(String[] args) { } // implement a loop of your choice here // Method that calculates the square root of integer variables public static double myRoot(int number) { double root; root=number/2; double root old; do { root old root; root (root_old+number/root_old)/2; } while (Math.abs(root_old-root)>1.8E-6); return root; } // Method that calculates the square root of double variables public static double myRoot(double number) { double root; root number/2; double root_old; do { root old root; root (root_old+number/root_old)/2; while (Math.abs (root_old-root)>1.0E-6); return root; } } Program-it-Yourself: In the main method, create a program that…arrow_forwardI would like to know the main features about the following 3 key concepts:1. Backup Domain Controller (BDC)2. Access Control List (ACL)3. Dynamic Memoryarrow_forward
- In cell C21, enter a formula to calculate the number of miles you expect to drive each month. Divide the value of number of miles (cell A5 from the Data sheet) by the average MPG for the vehicle multiplied by the price of a gallon of gas (cell A6 from the Data sheet).arrow_forwardMicrosoft Excelarrow_forwardIn cell C16, enter a formula to calculate the price of the vehicle minus your available cash (from cell A3 in the Data worksheet). Use absolute references where appropriate—you will be copying this formula across the row what fomula would i use and how do i solve itarrow_forward
- What types of data visualizations or tools based on data visualizations have you used professionally, whether in a current or past position? What types of data did they involve? What, in your experience, is the value these data views or tools added to your performance or productivity?arrow_forwardQuestion: Finding the smallest element and its row index and column index in 2D Array: 1. Write a public Java class min2D. 2. In min2D, write a main method. 3. In the main method, create a 2-D array myArray with 2 rows and 5 columns: {{10, 21, 20, 13, 1}, {2, 6, 7, 8, 14}}. 4. Then, use a nested for loop to find the smallest element and its row index and column index. 5. Print the smallest element and its row index and column index on Java Consolearrow_forward(using R)The iris data set in R gives the measurements in centimeters of the variables sepal length and width andpetal length and width, respectively, for 50 flowers from each of 3 species of iris, setosa, versicolor, andvirginica. Use the iris data set and the t.test function, test if the mean of pepal length of iris flowers isgreater than the mean of sepal length.The iris data set in R gives the measurements in centimeters of the variables sepal length and width andpetal length and width, respectively, for 50 flowers from each of 3 species of iris, setosa, versicolor, andvirginica. Use the iris data set and the t.test function, test if the mean of pepal length of iris flowers isgreater than the mean of sepal length.arrow_forward
- Recognizing the Use of Steganography in Forensic Evidence (4e)Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02arrow_forwardWrite a Java Program to manage student information of a university. The Javaprogram does the following steps:a) The program must use single-dimensional arrays to store the studentinformation such as Student ID, Name and Major.b) The program asks the user to provide the number of students.c) The program asks the user to enter the Student IDs for the number of studentsand stores them.d) The program asks the user to enter the corresponding names for the numberof students and stores them.e) The program then asks the user to provide the corresponding major for thestudents and stores them.f) The program then should display the following options:1. ID Search2. Major Enrollment3. Exitg) On selecting option 1, the user can search for a student using Student ID. Theprogram asks the user to enter a Student ID. It then should print thecorresponding student’s details such as Name and Major if the user providedStudent ID number is present in the stored data. If the user’s Student IDnumber does not…arrow_forward(a) Algebraically determine the output state |q3q2q1q0> (which is a 4-qubitvector in 16-dimensional Hilbert space). Show all steps of your calculations. (b) Run a Qiskit code which implements the circuit and append threemeasurement gates to measure the (partial) output state |q2q1q0> (which is a 3-qubit vector in 8-dimensional Hilbert space). this is for quantum soft dev class, you can use stuff like Deutsch Jozsa if u wantarrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)