Re: RISC/CISC Hack Architecture
Posted by
yhirshhorn on
URL: http://nand2tetris-questions-and-answers-forum.52.s1.nabble.com/RISC-CISC-Hack-Architecture-tp4034432p4036652.html
Thanks. I am happy to see I wasn't so far off as I thought.
I am a bit confused though, because you say you agree with me but not for the same reasons. If I understood your reasons correctly, they are the clear violations of requirements 1 and 2, and they (the requirements) seem to formalize my previous message. Am I missing something?
I wrote:
yhirshhorn wrote
Then I would say CISC more than RISC, since C commands can load, compute, store and branch at the same time, and in multiple destinations. Compared to the little I know about other ISAs, this is a lot. I am used to having a command either load, compute or store, or branch...
Is this essentially different from requirements 1 and 2?