{"id":397,"date":"2019-09-24T17:26:25","date_gmt":"2019-09-24T11:56:25","guid":{"rendered":"https:\/\/binaryterms.com\/?p=397"},"modified":"2019-09-30T12:34:53","modified_gmt":"2019-09-30T07:04:53","slug":"cisc-processors","status":"publish","type":"post","link":"https:\/\/binaryterms.com\/cisc-processors.html","title":{"rendered":"CISC Processor"},"content":{"rendered":"<p><strong>CISC<\/strong> is an abbreviation for <strong>Complex Instruction Set Computer<\/strong>. CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer memory uses to be &#8216;small&#8217; and &#8216;very expensive&#8217;.<\/p>\n<p>CISC processors were helpful in simplifying the code and making it <strong>shorter<\/strong> in order to reduce the memory requirement. In a CISC processor, a single instruction has &#8216;several low-level operations&#8217;. This makes the CISC instructions short but &#8216;complex&#8217;.<\/p>\n<p>In this section, we will learn about the architecture, instruction set, pipelining in CISC processors and its advantages and disadvantages. So let us start with the topic.<\/p>\n<h2>Content: CISC Processors<\/h2>\n<ol>\n<li><a href=\"#CISCArchitecture\">CISC Architecture<\/a><\/li>\n<li><a href=\"#CISCInstructionSet\">CISC Instruction Set<\/a><\/li>\n<li><a href=\"#PipelininginCISCProcessor\">Pipelining in CISC Processor<\/a><\/li>\n<li><a href=\"#AdvantagesandDisadvantages\">Advantages and Disadvantages<\/a><\/li>\n<li><a href=\"#KeyTakeaways\">Key Takeaways<\/a><\/li>\n<\/ol>\n<p><a name=\"CISCArchitecture\"><\/a><\/p>\n<h2>CISC Processors Architecture<\/h2>\n<p>As we have studied above the main objective of a CISC processor is to <strong>minimize<\/strong> the program size by <strong>reducing<\/strong> the <strong>number of instructions<\/strong> in a program. This is done by &#8217;embedding some of the low-level instructions in a single complex instruction&#8217;. Later when decoded this instruction generates several microinstructions to execute.<\/p>\n<p>Now if a program\/software is getting simplified then the hardware has to get on work and must be able to perform the complex tasks. That&#8217;s why a CISC processor has complex hardware.\u00a0 The block diagram of CISC architecture is given below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-423\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\" alt=\"CCISC Processors Architecture\" width=\"600\" height=\"406\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg 600w, https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture-300x203.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here, you have a special <strong>microprogram control unit<\/strong> that uses a series of microinstructions of the microprogram stored in the &#8220;control memory&#8221; of the <em>microprogram control unit<\/em> and generate the <strong>control signals<\/strong>.<\/p>\n<p>The <strong>control units<\/strong> access the <strong>control signals<\/strong> produced by the <em>microprogram control unit<\/em> &amp; operate the functioning of processors hardware.<\/p>\n<p><strong>Instruction and data path<\/strong> fetches the opcode and operands of the instructions from the memory.<\/p>\n<p><strong>Cache<\/strong> and <strong>main memory<\/strong> is the location where the program instructions and operands are stored.<\/p>\n<h4>Examples of CISC Processors are:<\/h4>\n<p>IBM 370\/168, VAX 11\/780, Intel 80486.<br \/>\n<a name=\"CISCInstructionSet\"><\/a><\/p>\n<h3>CISC Processors Instruction Sets<\/h3>\n<p>CISC instructions are <strong>complex<\/strong> in nature and occupy <strong>more than a single word<\/strong> in memory. Like RISC uses Load\/Store for accessing the memory operands, CISC has <strong>Move<\/strong> instruction to access memory operands.<\/p>\n<p>But, unlike Load and Store, the Move operation in CISC has wider scope. The CISC instructions can &#8220;directly access memory operands&#8221;.<\/p>\n<p>The general format of Move instruction is<\/p>\n<p style=\"text-align: center\"><strong>Move <em>destination, source<\/em><\/strong><\/p>\n<p>It can move an <em>immediate operand<\/em>, to a <strong>memory location<\/strong> or a <strong>register<\/strong>.<\/p>\n<p style=\"text-align: center\"><strong>Move A, 100<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Move R, 100<\/strong><\/p>\n<p>It can transfer the operand between two <strong>memory location<\/strong>.<\/p>\n<p style=\"text-align: center\"><strong>Move A, B<\/strong><\/p>\n<p>It can transfer the operand between two <strong>registers<\/strong>.<\/p>\n<p style=\"text-align: center\"><strong>Move R1, R2<\/strong><\/p>\n<p>Including the five basic addressing mode like:<\/p>\n<p>Immediate mode, direct\/absolute mode, register mode, Indirect mode and Index mode.<\/p>\n<p>CISC instruction set has some additional addressing modes. Those are &#8220;auto increment mode&#8221;, &#8220;auto decrement mode&#8221; and &#8220;relative mode&#8221;.<\/p>\n<p><strong>Autoincrement mode<\/strong>:<\/p>\n<p>Here, the effective address of an operand is the content of the register. After accessing the register\u2019s content, it is automatically incremented to point the memory location of next operand.<\/p>\n<p><strong>Auto decrement mode:<\/strong><\/p>\n<p>Here also, the effective address of an operand is the content of the register. But, here initially, the content of register is decremented and then the content of register is used as an effective address for an operand.<\/p>\n<p><strong>Relative Mode:<\/strong><\/p>\n<p>It is similar to &#8220;Index register mode&#8221; where the effective address is obtained by adding a constant to the content of the general-purpose register. In relative mode instead of a general-purpose register, the <strong>program counter<\/strong> is used. This kind of addressing mode is used to refer large range of area in memory.<\/p>\n<p>Now above we have mentioned that the CISC processor minimizes the number of instructions which turns the length of code relatively shorter.<\/p>\n<h3>Let us see how the CISC style instructions minimizes the code length?<\/h3>\n<p>Suppose, we have an operation<\/p>\n<p style=\"text-align: center\"><strong>A= B+C<\/strong><\/p>\n<p><strong>RISC<\/strong> instruction set for this would be:<\/p>\n<p style=\"text-align: center\"><strong>Load R2, B<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Load R3, C<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Add R4, R2, R3<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Store R4, A<\/strong><\/p>\n<p>Now, let us see the <strong>CISC<\/strong> instruction set for the same operation.<\/p>\n<p style=\"text-align: center\"><strong>Move A, B<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Add A, C<\/strong><\/p>\n<p>The objective of four RISC style instructions is fulfilled by only two instructions of the CISC style.<\/p>\n<p>So we can say that CISC architecture effectively minimizes the number of instructions in the program as a single instruction execution, executes several low-level instructions in a program.<br \/>\n<a name=\"PipelininginCISCProcessor\"><\/a><\/p>\n<h3>Pipelining in CISC Processors<\/h3>\n<p><strong>RISC<\/strong> style instructions provide ease to implement pipelining as they all are of <strong>one word<\/strong>. The operands of all the instructions are present in the same position within the word. Excluding <strong>Load<\/strong> and <strong>Store<\/strong> instructions <strong>all other<\/strong> instruction operate on the <strong>register operands<\/strong>.<\/p>\n<p>So it becomes easy to implement pipelining for RISC style instructions. But, same is not in the case of CISC style instructions. <strong>CISC instructions<\/strong> are of &#8220;variable length&#8221;, they have &#8220;multiple operands&#8221;, &#8220;complex addressing modes&#8221; &amp; &#8220;complex instructions&#8221;.<\/p>\n<p>Now, <strong>CISC<\/strong> instruction occupies <strong>more than a memory word<\/strong>. So it will take <strong>several cycles<\/strong> for operand fetch. Further, we know instructions are of variable sizes and format, this complicates the decoding of instruction and operand fetch. That\u2019s why implementing pipelining to CISC style instructions is a complicated task.<\/p>\n<p>Let us understand this with the help of an example:<\/p>\n<p style=\"text-align: center\"><strong>Move (R2), (R3)<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Move (R4), R5<\/strong><\/p>\n<p>In the first Move instruction, the <strong>effective addres<\/strong>s of both the operands is a <strong>memory location<\/strong>. So, it will require two memory accesses.<\/p>\n<p>In the second Move instruction, the <strong>effective address<\/strong> of the &#8216;first operand&#8217; is a <strong>memory location<\/strong> and <strong>effective address<\/strong> of the &#8216;second operand&#8217; is a <strong>register<\/strong>. The second instruction needs only one memory access. Here, the second Move instruction needs to be <strong>stalled<\/strong> so, that the first Move instruction can complete accessing of both the operands from the memory.<\/p>\n<p>Hence, implementing pipelining to CISC style instructions is quite complicated.<br \/>\n<a name=\"AdvantagesandDisadvantages\"><\/a><\/p>\n<h3>Advantages and Disadvantages of CISC Processors<\/h3>\n<h4>Advantages:<\/h4>\n<ol>\n<li>The <strong>code size<\/strong> is comparatively <strong>shorter<\/strong> which minimizes the memory requirement.<\/li>\n<li>Execution of a <strong>single instruction<\/strong> accomplishes <strong>several low-level tasks<\/strong>.<\/li>\n<li><strong>Complex addressing mode<\/strong> makes the memory access <strong>flexible<\/strong>.<\/li>\n<li>CISC instruction can <strong>directly<\/strong> access <strong>memory locations<\/strong>.<\/li>\n<\/ol>\n<h4>Disadvantages:<\/h4>\n<ol>\n<li>Though the code size is minimized but it requires <strong>several clock cycles<\/strong> to execute a single instruction. Thereby reduce the overall <strong>performance<\/strong> of the computer.<\/li>\n<li>Implementing <strong>pipelining<\/strong> for CISC instruction is a bit <strong>complicated<\/strong>.<\/li>\n<li>The <strong>hardware<\/strong> structure needs to be more <strong>complex<\/strong> to simplify software implementation.<\/li>\n<li>Designed to minimize the memory requirement when memory was smaller and costlier. But today the scenario has changed nowadays memory is inexpensive and mostly all computers have a large amount of memory.<\/li>\n<\/ol>\n<p><a name=\"KeyTakeaways\"><\/a><\/p>\n<div id=\"keytake\">\n<h3>Key Takeaways<\/h3>\n<ul>\n<li>CISC processor was introduces <strong>before<\/strong> the evolution of RISC processor. It was not that the CISC was a wrong approach both CISC and RISC were developed on a different spectrum.<\/li>\n<li>CISC processor have instructions that occupy <strong>more than one memory word<\/strong>.<\/li>\n<li>A single instruction has several low-level instructions.<\/li>\n<li>Each instruction requires <strong>more than one clock cycle<\/strong>.<\/li>\n<li>CISC instructions have complex addressing modes, complex instructions; hence decoding of instruction is also complex.<\/li>\n<li>CISC instructions can directly operate on memory operand.<\/li>\n<li>The program size is smaller as <strong>fewer<\/strong> but <strong>complex instructions<\/strong> are used.<\/li>\n<\/ul>\n<\/div>\n<p>So this is all about CISC processors. The recent CISC processor include some of the RISC characteristics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISC is an abbreviation for Complex Instruction Set Computer. CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer memory uses to be &#8216;small&#8217; and &#8216;very expensive&#8217;. CISC processors were helpful in simplifying the code and making it shorter in order to reduce [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-397","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computer-architecture","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is CISC Processors? Architecture, Examples, Instruction Set, Advantages &amp; Disadvanatges - Binary Terms<\/title>\n<meta name=\"description\" content=\"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binaryterms.com\/cisc-processors.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is CISC Processors? Architecture, Examples, Instruction Set, Advantages &amp; Disadvanatges - Binary Terms\" \/>\n<meta property=\"og:description\" content=\"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binaryterms.com\/cisc-processors.html\" \/>\n<meta property=\"og:site_name\" content=\"Binary Terms\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-24T11:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-30T07:04:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\" \/>\n<meta name=\"author\" content=\"Neha T\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neha T\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html\"},\"author\":{\"name\":\"Neha T\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\"},\"headline\":\"CISC Processor\",\"datePublished\":\"2019-09-24T11:56:25+00:00\",\"dateModified\":\"2019-09-30T07:04:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html\"},\"wordCount\":1184,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\",\"articleSection\":[\"Computer Architecture\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/binaryterms.com\/cisc-processors.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html\",\"url\":\"https:\/\/binaryterms.com\/cisc-processors.html\",\"name\":\"What is CISC Processors? Architecture, Examples, Instruction Set, Advantages & Disadvanatges - Binary Terms\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\",\"datePublished\":\"2019-09-24T11:56:25+00:00\",\"dateModified\":\"2019-09-30T07:04:53+00:00\",\"description\":\"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....\",\"breadcrumb\":{\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binaryterms.com\/cisc-processors.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg\",\"width\":600,\"height\":406,\"caption\":\"CCISC Processors Architecture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/binaryterms.com\/cisc-processors.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/binaryterms.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISC Processor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binaryterms.com\/#website\",\"url\":\"https:\/\/binaryterms.com\/\",\"name\":\"Binary Terms\",\"description\":\"The Computer Science &amp; IT Guide\",\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/binaryterms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/binaryterms.com\/#organization\",\"name\":\"Binary Terms\",\"url\":\"https:\/\/binaryterms.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"width\":400,\"height\":63,\"caption\":\"Binary Terms\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\",\"name\":\"Neha T\",\"url\":\"https:\/\/binaryterms.com\/author\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is CISC Processors? Architecture, Examples, Instruction Set, Advantages & Disadvanatges - Binary Terms","description":"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/binaryterms.com\/cisc-processors.html","og_locale":"en_GB","og_type":"article","og_title":"What is CISC Processors? Architecture, Examples, Instruction Set, Advantages & Disadvanatges - Binary Terms","og_description":"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....","og_url":"https:\/\/binaryterms.com\/cisc-processors.html","og_site_name":"Binary Terms","article_published_time":"2019-09-24T11:56:25+00:00","article_modified_time":"2019-09-30T07:04:53+00:00","og_image":[{"url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg","type":"","width":"","height":""}],"author":"Neha T","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neha T","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/binaryterms.com\/cisc-processors.html#article","isPartOf":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html"},"author":{"name":"Neha T","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe"},"headline":"CISC Processor","datePublished":"2019-09-24T11:56:25+00:00","dateModified":"2019-09-30T07:04:53+00:00","mainEntityOfPage":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html"},"wordCount":1184,"commentCount":1,"publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"image":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg","articleSection":["Computer Architecture"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/binaryterms.com\/cisc-processors.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/binaryterms.com\/cisc-processors.html","url":"https:\/\/binaryterms.com\/cisc-processors.html","name":"What is CISC Processors? Architecture, Examples, Instruction Set, Advantages & Disadvanatges - Binary Terms","isPartOf":{"@id":"https:\/\/binaryterms.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage"},"image":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg","datePublished":"2019-09-24T11:56:25+00:00","dateModified":"2019-09-30T07:04:53+00:00","description":"CISC processors were evolved in the 1970s before the evolution of RISC (Reduced Instruction Set Computers) processors. During this period the computer....","breadcrumb":{"@id":"https:\/\/binaryterms.com\/cisc-processors.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/binaryterms.com\/cisc-processors.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/cisc-processors.html#primaryimage","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2019\/09\/CISC-Processors-Architecture.jpg","width":600,"height":406,"caption":"CCISC Processors Architecture"},{"@type":"BreadcrumbList","@id":"https:\/\/binaryterms.com\/cisc-processors.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/binaryterms.com\/"},{"@type":"ListItem","position":2,"name":"CISC Processor"}]},{"@type":"WebSite","@id":"https:\/\/binaryterms.com\/#website","url":"https:\/\/binaryterms.com\/","name":"Binary Terms","description":"The Computer Science &amp; IT Guide","publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/binaryterms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/binaryterms.com\/#organization","name":"Binary Terms","url":"https:\/\/binaryterms.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","width":400,"height":63,"caption":"Binary Terms"},"image":{"@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe","name":"Neha T","url":"https:\/\/binaryterms.com\/author\/author"}]}},"_links":{"self":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":0,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"wp:attachment":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}