Ginni has Published 1580 Articles

Discuss the Hardware Algorithm in Computer Architecture?

Ginni

Ginni

Updated on 27-Jul-2021 13:35:16

2K+ Views

An algorithm to multiply two numbers is known as the multiplication algorithm. The hardware multiply algorithm is used in digital electronics such as computers to multiply binary digits. The figure shows the flowchart for the hardware multiply algorithm.In the flowchart shown in the figure, the multiplicand is in Y and ... Read More

What is the subtraction of binary numbers?

Ginni

Ginni

Updated on 27-Jul-2021 13:33:35

651 Views

Binary numbers are subtracted by performing two’s complement on the subtrahend. Two’s complement is done through the following steps −Complement every digit. That is, change 1 to 0 and 0 to 1.Add 1 to the output.The following example illustrates the subtraction operation of binary digits using the above-mentioned steps.Example: 11101011 ... Read More

What is the addition of binary numbers?

Ginni

Ginni

Updated on 27-Jul-2021 13:03:50

585 Views

The addition of binary numbers is easy yet tedious at the same time. It is a fundamental feature of digital computers, and hence it is important to know how to add binary digits.Almost all the operations of a computer depend on binary addition. Once we understand the addition of two ... Read More

What is the difference between RISC and CISC in Computer Architecture?

Ginni

Ginni

Updated on 27-Jul-2021 12:45:33

7K+ Views

RISCRISC represents Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations. In RISC, all instructions have simple register addressing and hence use less ... Read More

What is RISC Processor?

Ginni

Ginni

Updated on 27-Jul-2021 12:44:30

15K+ Views

RISC stands for Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations.Thus, data is stored in processor registers for computations, and results of ... Read More

What is CISC Processor?

Ginni

Ginni

Updated on 27-Jul-2021 12:43:30

9K+ Views

CISC stands for Complex Instruction Set Computer. It comprises a complex instruction set. It incorporates a variable-length instruction format. Instructions that require register operands can take only two bytes.The instructions that require two memory addresses can take five bytes to include the complete instruction code. Thus, CISC has a variable-length ... Read More

What are the types of Program Interrupts in Computer Architecture?

Ginni

Ginni

Updated on 27-Jul-2021 12:41:25

11K+ Views

Program interrupt defines the transfer of program control from a currently running program to another service program as a result of an external or internal created request. Control returns to the initial program after the service program is implemented.There are three major types of program interrupts that are as follows ... Read More

Explain the characteristics of CMOS?

Ginni

Ginni

Updated on 27-Jul-2021 09:17:20

4K+ Views

There are various characteristics of CMOS which are as follows −Noise Margin − The noise margin of CMOS logic ICs is significantly greater than that of TTL ICs. These circuits are available with a broad supply voltage range and the noise margin improves with the supply of voltage VCC.The noise ... Read More

What is a Priority Encoder?

Ginni

Ginni

Updated on 27-Jul-2021 09:14:52

12K+ Views

The priority encoder is a circuit that executes the priority function. The logic of the priority encoder is such that two or more inputs appear at an equal time, the input having the largest priority will take precedence. The truth table of a four-input priority encoder is given in the ... Read More

What is Wormhole Routing?

Ginni

Ginni

Updated on 27-Jul-2021 09:11:48

936 Views

Wormhole routing is a unique case of virtual cut-through, where the buffers at the intermediate nodes are the size of a flit. The network latency is equal to in virtual cut-through and thus autonomous of the communication distance.The advantage of wormhole routing over circuit switching and virtual cut-through appears in ... Read More

Advertisements