Nt1330 Unit 7 Study Guide

Great Essays
Piseth Hul ITE 221 Prof: Jenee’ Saunders Sep 21, 2015 Review Questions Ch.4
1. Describe the operation of a MOVE instruction. Why is the name MOVE a misnomer?  Move is a instruction that copies data bits to storage locations and can copy data between any combination of registers and primary storage locations. The name MOVE is misnomer because the data content of the source location is unchanged.
2. Why does program execution speed generally increase as the number of general-purpose registers increase?  Program executing speed generally increase as the number of general-purpose registers increase because general-purpose registers are used in CPU holding intermediate results or frequently used data values, such as loop counters or array indexes. Since primary storage can provide slower process, registers are used for data that immediately needed in CPU to avoid wait states.
3. What are special-purpose registers? Give three examples of special-purpose registers and explain how each is used?  Special-purpose registers are used by the CPU for specific purpose.  There’re some special-purpose registers:  -Instruction register is used when the control unit fetches an instruction from memory, it stores
…show more content…
How does a RISC processor differ from a CISC processor? Is one processor type better than the other? Why or why not?  *Complex instruction set computing (CISC) is a philosophy of processor design that deliberately includes complex instruction in the instruction set. While reduced instruction set computing (RISC) is a philosophy of processor design that limits that number and type of complex instructions in the instruction set. RISC processors avoid instructions that combine data transformation and data movement operations. RISC does some inherent advantages for computationally intensive applications but it doesn’t mean people stop using CISC because most majority of Intel processors were built with CISC. As a result, they keep using CISC in for backward

Related Documents

  • Improved Essays

    Part B Q1. The normal dose of paracetamol is very safe to use and it is not over 4g per 24 hours; however, when the patient take more than 6g per 24 hours of paracetamol, the liver necrosis will happen within 10 to 12 hours and liver damage may occur within 24 to 48 hours. For the metabolism, most of the paracetamol is converted to nontoxic metabolites by the phase II conjugation of glucuronide and sulfate and a small amount of paracetamol is oxidized by the Cytochrome P450 (CYP) enzymes in the phase I metabolism. In this phase, CYP1A2 and CYP2E1 enzymes convert paracetamol to N-acetyl-p-benzoquinoneimine (NAPBQI) which is highly toxic substances.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Study Guide

    • 460 Words
    • 2 Pages

    THYROID GLAND: The thyroid gland, located inside the neck, takes iodine from foods and converts it into thyroid hormones. CIRCULATORY SYSTEM: ANTERIOR VENA CAVA: The anterior vena cava drains the body of blood cranially to the heart. POSTERIOR VENA CAVA:…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Remove your VGA and RAM and plug them in again. If that doesn't work there might be a problem with your power supply. 1. Check the keyboard to ensure that there are no stuck 2. Check all cables connected to the computer and make sure they are fully plugged in. 3.…

    • 174 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2 Study Guide

    • 257 Words
    • 2 Pages

    1. A graft reject is a process in which the body immune system reacts or defends against the transplanted tissue. Because of this possibly, tissue typing or histocompatibility is used to minimize the chance of rejection of the recipient transplanted organ. The immune system attempts to defend the body against harmful substances such as germs, poisons, and sometimes, cancer cells.…

    • 257 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    A system upgrade is long overdue at NA Videos. This report will outline: 1. Key issues 2. Purpose of the new system (solutions) 3. What the system will and will not include 4.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Microsoft Hyper-V Server 2012 R2 is a server designed for virtual machine (VM). Virtualization is creation include storage, device, operation system as virtual rather than physical. Almost similar to VMware vSphere as virtual machine. VMware vSphere is cost for VMware install on server. But the features will be available than Microsoft Hyper-V Server 2012 R2 because it is free virtual machine for stand-alone.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2 Study Guide

    • 622 Words
    • 3 Pages

    1. Overt, explicit, planned or written curriculum 1 WRITTEN AS PART OF FORMAL INSTRUCTIONS OF SCHOOL PROGRAMME. 2 IT'S A SUPPORTIVE TEACHING MATERIAL. 3 IT FALLS UNDER THE FORMAL DESIGNATED CURRICULUM MADE BY COLLECTIVE PROFFESIONALS .…

    • 622 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Quiz

    • 1731 Words
    • 7 Pages

    Please note that, we only discuss couple of options for each command to get the familiarity, and get you going with your learning. At the end of each command, there is a link to the command reference, where we discuss the most relevant and practical usages of the commands. It not practical to discuss all the options available for each command we discuss. We recommend you to refer to the man page of the command on your Linux system. Listing Files…

    • 1731 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    · Memory: This is any computer component that has the ability to storing information or data temporary or permanently, e.g. Read And Write Memory (RAM) and Not Volatile Read And Write Memory (NVRAM). · CPU: This is the brain of the computer and is the central process unit, and it received command/instruction from the computer software and sends the instruction to the right hardware to execute the instruction, and also received the feedback from the hardware and forwards it to the software. · Storage: This is the part of the computer where information or data have been kept temporary or permanently.…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Term Paper

    • 485 Words
    • 2 Pages

    1. Define the following terms: According to the textbook below are the following definitions. • Surface water-Water from lakes, streams, rivers, and surface springs (Friis, 2012, pg. 211). • Groundwater- Any water that is stored naturally deep underground in aquifers or that flows through rock and soil, supplying springs and wells; this water is less susceptible to contamination than surface water (Friis, 2012, pg. 211).…

    • 485 Words
    • 2 Pages
    Improved Essays