In reference to the Masked Move instruction, list three mask rules.

What will be an ideal response?


Mask Rules
1. The mask is typically either binary or a hexadecimal value.
2. Data are passed through the mask bit by bit. The mask bit in the same position as the source bit determines whether a copy of the data is to pass. To pass data through the mask, set the appropriate bit (setting a bit means making it equal 1). To mask data from passing from the source to the destination, reset the appropriate bit (resetting a bit means making it equal 0).
3. Destination bits that correspond to 0s in the mask are not changed.
4. Mask bits can be either a constant or the tag where that mask is found.

Computer Science & Information Technology

You might also like to view...

What type of data structure are the elements of a linked list?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ is particularly appropriate for providing services that disparate objects have in common.

a) abstract class b) concrete class c) interface d) None of the above.

Computer Science & Information Technology

Comments are displayed (by default) with ____.

A. a green squiggly line B. green text C. blue text D. a blue squiggly line

Computer Science & Information Technology

A Wi-Fi enabled microSD card is an example of what type of device?

A. PCIe B. mobile card C. SDIO D. Secure Digital

Computer Science & Information Technology