1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
3

The processor needs to compute the next PC after each instruction. Write a verilog module which computes the next PC. Be sure to

include the B, and CBZ cases. You may use the output of the "Control" module.
Computers and Technology
1 answer:
slamgirl [31]3 years ago
5 0

Answer:

Check the explanation

Explanation:

module calculatePC (

input Rst, // Reset is asynchronous an active high

input [15:0] BranchAddress, // Branch Address

input Clk, // Clock of MPU

input B, // Branch instruction is Recieved

input CNZ, // Compare with Zero and Branch is Recieved

input ZeroFlag, // Zero Flag input

output [19:0] PC // Program Counter

);

reg [19:0] NextPC, PC;

always "at" (*)

begin

if (B == 1'b1)

NextPC = BranchAddress;

else if ((CNZ == 1'b1) && (ZeroFlag == 1'b1))

NextPC = BranchAddress;

else

NextPC = NextPC + 20'd4;

end

always "at"(posedge Clk or posedge Rst)

begin

if (Rst)

PC <= 20'd0;

else  

PC <= NextPC;

end

 

endmodule

You might be interested in
Which osi reference model layer is responsible for transmitting information on computers connected to the same local area networ
Nikolay [14]
The data link layer (layer 2)
7 0
4 years ago
To make sound decisions about information security, management must be informed about the various threats facing the organizatio
const2013 [10]

Answer:

The answer is A. True

Explanation:

It is the responsibility of management to be aware of the current and potential threats that the organization is facing or prone to face in the nearest future. The threats could be focused on data integrity, valuable information, applications, or human personnel.

Hence, to make adequate decisions on information security, the management must take an assessment of the current situation of the organization and make plans towards securing the organization.

8 0
3 years ago
True or False:<br><br> You can convert your PowerPoint presentation in web pages.
jenyasd209 [6]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
Describe the difference between information poor and information rich society?​
den301095 [7]

Explanation:

The “Information poor” are consumers who use traditional mass media information such as television, DVDs, radios and magazines. ... On the opposite “information rich” stands for a new elite within the information society.

4 0
2 years ago
Women make up 52 percent of the voting-age population and are more likely to vote, yet
NeX [460]
<span>Gender discrimination has been a prevalent issue that prevented a century of women not to participate.

Discrimination has become widespread nowadays ranging from gender discrimination, racial discrimination, work discrimination and many others.These types of discrimination are experienced by almost all people everyday without them even knowing it. Some discrimination lies behind a sweet smile and an accommodating eyes and in order to defend yourself against this discrimination you need to load up yourself of a lot of self confidence.</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these printers would be the most suitable for printing a large number of high quality black and white printouts?
    15·1 answer
  • Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
    13·1 answer
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • What is the name of the device that senses the current flowing, tripping the circuit, and cutting off the electricity?
    13·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • Which of the following game markets especially benefits from using vector graphics?
    8·1 answer
  • Write two recursive versions of the function minInArray. The function will be given a sequence of elements and should return the
    8·1 answer
  • Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase
    10·1 answer
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!