The ARM puts the program counter in register r15, making it visible to the programmer. Someone writing about the ARM stated that this exposed the ARM’s pipeline. What did he mean, and why? Note: You may have to look at the section on pipelining to answer this.

What will be an ideal response?


The ARM is a pipelined computer in the sense that instruction execution is overlapped; that is, the next instruction begins execution before the current instruction has been executed to completion. In a non?pipelined computer (and they do not exist today), the PC is incremented after an instruction is fetched. Therefore, the PC points at the next instruction. In a pipelined computer the PC is used to fetch the next instruction and the instruction after that etc., before the current instruction is executed. Therefore, it is difficult to know the value of the PC. Consequently, the PC does not contain the address of the next instruction. However, the PC always points to the instruction being FETCHED.

Computer Science & Information Technology

You might also like to view...

Assume that transactions are executed at REPEATABLE READ. Give an example in which a phantom occurs when a transaction executes a DELETE statement to delete a set of tuples satisfying some predicate, P.

What will be an ideal response?

Computer Science & Information Technology

Word's Styles group in the HOME tab contains buttons to format a list with bullets or numbers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which operator, when used with two bags, causes Python to run the __add__ method?

A. = B. * C. + D. %

Computer Science & Information Technology

The notion of a particular government organization or agency making a decision that a given product or system possesses sufficient security protection is called a security ______________.

A. accreditation B. certification C. evaluation D. approval E. qualification

Computer Science & Information Technology