question archive The Hack architecture partitions the address space, and does not allow both data and instructions to be stored in the same space

The Hack architecture partitions the address space, and does not allow both data and instructions to be stored in the same space

Subject:Computer SciencePrice:2.84 Bought6

The Hack architecture partitions the address space, and does not allow both data and instructions to be stored in the same space.

a)What are the implications of this architecture?

b)Explain and discuss in your own words.

This will require outside research:

1) Discuss is the difference between RISC and CISC architecture. What are the advantages and disadvantages of each architecture?

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

The implications of the hack architecture:

The hack architecture implications are used to identify the exploiting the weakness of the computer networks.

The detailed implications of the hack architecture:

Architecture I :

  1. The von Neumann architecture changes the size of the operating system and the program will be recompiled.
  2.  the program will be compiled and the size of the address space of the program cannot be larger than the physical memory and no way for generating the larger address rather than the physical address.
  3. The protection of the program can be written anywhere in the physical memory.
  4. It is sharing the code while running the code continuously.

Architecture II:

  1. It is impossible to protect the data module program from one another.
  2. For many programs, it will be able to fit the physical memory and there is no single program larger than the physical memory.

Architecture III:

The address field of the operand implies partitioning the data and the program not larger than the main memory.

The difference between RISC and CISC architecture:

CISC 

  • It referred to as hardware                                               
  • It has multiple instruction size and the format 
  • It uses fewer register                                                      
  • It has few addressing modes                                       
  • Pipelining is easy                                                        

RISC:

  • It is referred to as software.
  • It has an instruction set with few formats.
  • It uses more register
  • It has a more addressing mode
  • Pipelining is difficult.

CISC advantages and Disadvantage:

Advantage:

  • The CISC is easy to add the new commands without changing the structure of the instruction set.
  • It is used to allow the architecture to create the effective use of the main memory.
  • It is simple to use the language.

Disadvantage:

  • The instruction set of chip hardware will be more complex to generate the computer
  • The performance of the time will be slow on the machine and the different instructions are not the same.
  • It is large and needs more transistors.

RISC Advantage and the Disadvantage:

Advantage:

  • It is efficient machine instructions
  • It has few registers while compared with the RISC processors.
  • It will reduce the instruction set and will provide the addressing scheme for memory operands.

Disadvantage:

  • The RISC is an important role to convert the CISC code to RISC code.
  • RISC code has large memory caches on the chip
  • The RISC requires the on-chip hardware will be reprogrammed.

Step-by-step explanation

The implications of the hack architecture:

  • The hack architecture implications will be to hack each process of the computer system such as to identify the theft while sharing the information, electronic money transfer, ATM fraud, and the denial of service.
  • It informs the software and the hardware clients to provide the weakness of the service.

The CISC and the RISC:

  • The complex instruction set computer which implies single instructions will execute the low-level operations and it is essential for multi-step operations for the single instructions.
  • The RISC will be defined as the reduced instruction set computing of the information processing with family microprocessors to execute the computing task in the simplest instructions.

Related Questions