1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
2 years ago
5

How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the propo

sed change increase the size of an mips assembly program?
Computers and Technology
1 answer:
Phoenix [80]2 years ago
6 0

Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

<h3>3.  How could the proposed change increase the size of an mips assembly program?</h3>

The two-proposed changes decrease the size of an mips assembly program because a lot of complicated operations will need to be put in place or implemented in one instructions instead of numerous instructions due to the lowered register leaking issue. The program's size will be therefore be lowered as a result of this issue.

The proposed change will increase the size of an mips assembly program because  The size of the instruction word will then be brought up or raised if the required bits are added to the opcode and that of the register fields, which will bring up the size of the programmed.

In  the MIPS register file;

The Number of MIPS registers = 128

The Number of bits needed = log₂128

The  Number of bits needed = 7 bits

So Increasing number bits for opcode will be = (6 + 2)

                                                                       = 8

Therefore the answers to question one:

1. R-type instruction

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

rd = 5 bits

shamt = 5 bits

funct = 6 bits

Hence, the size of the opcode field will be go up by two bits, to eight bits and the size of the rs ,rt, and rd fields is also go up to 7 bits.

For question 2 which is I-type instruction, there is:

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

Immediate = 16 bits

Hence, The size of the opcode field will also go up by two bits, to eight bits and the size of the rs, rt  fields will is also go up to 7 bits.

Therefore, Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

Learn more about program from

brainly.com/question/14897427

#SPJ1

See full question below

Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each of the bit fields in the R-type instructions? 2. How this would this affect the size of each of the bit fields in the I-type instructions? 3. How could each of the two proposed changes decrease the size of an MIPS assembly program? On the other hand, how could the proposed change increase the size of an MIPS assembly program?

You might be interested in
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
3 years ago
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
In what year was the first phone using the android operating system sold in the united states?
inn [45]
In 2008 was when the first android operating system was sold in the United States.
8 0
3 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
What are the columns in a Microsoft Access table called?
givi [52]

Answer:

Field. In Access, columns are referred to as fields. When you organize your data by entering it into different fields, you are organizing it by type.

3 0
3 years ago
Other questions:
  • The intersection of a row and a column is commonly called what?
    15·1 answer
  • Zadanie nr 1
    7·1 answer
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • When is a chart legend used
    8·2 answers
  • When someone makes a bad or immoral decision because a group of their friends is also doing it, it is called:
    10·1 answer
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
    11·1 answer
  • Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
    8·1 answer
  • Where do you find the instructions, learning objectives, evaluation and scoring for this aba assignment?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!