In reference to the Masked Move instruction, list three mask rules.
What will be an ideal response?
Mask Rules
1. The mask is typically either binary or a hexadecimal value.
2. Data are passed through the mask bit by bit. The mask bit in the same position as the source bit determines whether a copy of the data is to pass. To pass data through the mask, set the appropriate bit (setting a bit means making it equal 1). To mask data from passing from the source to the destination, reset the appropriate bit (resetting a bit means making it equal 0).
3. Destination bits that correspond to 0s in the mask are not changed.
4. Mask bits can be either a constant or the tag where that mask is found.
You might also like to view...
What type of data structure are the elements of a linked list?
What will be an ideal response?
A(n) ________ is particularly appropriate for providing services that disparate objects have in common.
a) abstract class b) concrete class c) interface d) None of the above.
Comments are displayed (by default) with ____.
A. a green squiggly line B. green text C. blue text D. a blue squiggly line
A Wi-Fi enabled microSD card is an example of what type of device?
A. PCIe B. mobile card C. SDIO D. Secure Digital