SlideShare a Scribd company logo
1 of 40
 Registers hold data that can be readily accessed by
the CPU.
 They can be implemented using D flip-flops.
◦ A 32-bit register requires 32 D flip-flops.
 The arithmetic-logic unit (ALU) carries out logical and
arithmetic operations as directed by the control unit.
 The control unit determines which actions to carry out
according to the values in a program counter register
and a status register.
1
 Buses consist of data lines, control lines, and
address lines.
 While the data lines convey bits from one device to
another, control lines determine the direction of data
flow, and when each device can access the bus.
 Address lines determine the location of the source
or destination of the data.
2
The next slide shows a model bus configuration.
3
 Every computer contains at least one clock that
synchronizes the activities of its components.
 A fixed number of clock cycles are required to carry
out each data movement or computational operation.
 The clock frequency, measured in megahertz or
gigahertz, determines the speed with which all
operations are carried out.
 Clock cycle time is the reciprocal of clock frequency.
◦ An 800 MHz clock has a cycle time of 1.25 ns.
4
 A computer communicates with the outside world
through its input/output (I/O) subsystem.
 I/O devices connect to the CPU through various
interfaces.
 I/O can be memory-mapped-- where the I/O device
behaves like main memory from the CPU’s point of
view.
 Or I/O can be instruction-based, where the CPU has
a specialized I/O instruction set.
5
 Computer memory consists of a linear array of
addressable storage cells that are similar to registers.
 Memory can be byte-addressable, or word-
addressable, where a word typically consists of two or
more bytes.
 Memory is constructed of RAM chips, often referred
to in terms of length  width.
 If the memory word size of the machine is 16 bits,
then a 4M  16 RAM chip gives us 4 megabytes of
16-bit memory locations.
6
 How does the computer access a memory location
corresponds to a particular address?
 We observe that 4M can be expressed as 2 2  2 20
= 2 22 words.
 The memory locations for this memory are
numbered 0 through 2 22 -1.
 Thus, the memory bus of this system requires at
least 22 address lines.
◦ The address lines “count” from 0 to 222 - 1 in
binary. Each line is either “on” or “off” indicating
the location of the desired memory element.
7
 The normal execution of a program is altered when
an event of higher-priority occurs. The CPU is
alerted to such an event through an interrupt.
 Interrupts can be triggered by I/O requests,
arithmetic errors (such as division by zero), or when
an invalid instruction is encountered.
 Each interrupt is associated with a procedure that
directs the actions of the CPU when an interrupt
occurs.
◦ Nonmaskable interrupts are high-priority
interrupts that cannot be ignored.
8
seven registers are:
• Accumulator, AC, a 16-bit register that holds a
conditional operator (e.g., "less than") or one operand
of a two-operand instruction.
• Memory address register, MAR, a 12-bit register that
holds the memory address of an instruction or the
operand of an instruction.
• Memory buffer register, MBR, a 16-bit register that
holds the data after its retrieval from, or before its
placement in memory.
9
seven registers are:
• Program counter, PC, a 12-bit register that holds the
address of the next program instruction to be executed.
• Instruction register, IR, which holds an instruction
immediately preceding its execution.
• Input register, InREG, an 8-bit register that holds data
read from an input device.
• Output register, OutREG, an 8-bit register, that holds
data that is ready for the output device.
10
A computer goes through the following
instruction cycle repeatedly:
do
1. Fetch an instruction from memory
2. Decode the instruction
3. Read the effective address from memory
if the instruction has an indirect address
4. Execute the instruction until a HALT
instruction is encountered
11
 The fetch-decode-execute cycle is the series of steps
that a computer carries out when it runs a program.
 We first have to fetch an instruction from memory,
and place it into the IR.
 Once in the IR, it is decoded to determine what
needs to be done next.
 If a memory value (operand) is involved in the
operation, it is retrieved and placed into the MBR.
 With everything in place, the instruction is executed.
12
The next slide shows a flowchart of this process.
13
 All computers provide a way of interrupting the
fetch-decode-execute cycle.
 Interrupts occur when:
◦ A user break (e.,g., Control+C) is issued
◦ I/O is requested by the user or a program
◦ A critical error occurs
 Interrupts can be caused by hardware or
software.
◦ Software interrupts are also called traps.
14
 Interrupt processing involves adding another step to
the fetch-decode-execute cycle as shown below.
15
The next slide shows a flowchart of “Process the interrupt.”
16
 For general-purpose systems, it is common to
disable all interrupts during the time in which an
interrupt is being processed.
◦ Typically, this is achieved by setting a bit in the
flags register.
 Interrupts that are ignored in this case are called
maskable.
 Nonmaskable interrupts are those interrupts that
must be processed in order to keep the system in
a stable condition.
17
 Computer Instructions or data, anything that can
be stored electronically is Software.
 Hardware is one that is tangible. The storage
devices (Hard disk, CD’s etc.,), mouse, keyboard
CPU and display devices (Monitor) are Hardware.
For example: There is a problem in the Software
implies – Problem with program or data
System Software
Application Software
System Software includes the Operating System and all
the utilities that enable the computer to function.
 Are a set of programs which are meant not only for the
computer operation but also for the effective utilization
of the computer hardware.
 In other words system software are a set of program
which are used for controlling the computer hardware
and for interfacing, interconnecting the various
resources of computer system in an optimal way.
Example:
Operating Systems, Compiler, Loader, Linker,
Interpreter.
A set of program comprising various modules
that are written for specific application
Application Software includes programs that do real
work for user.
Example:
Payroll systems, Inventory Control, Manage
student database, Word Processor, Spreadsheet
and Database Management System etc.,
Operating System:
 Operating System is a software, which makes a
computer to actually work.
 It is the software the enables all the programs we
use.
 The OS organizes and controls the hardware.
 OS acts as an interface between the application
programs and the machine hardware.
 Examples: Windows, Linux, Unix and Mac OS, etc.,
Source
Languages
Target Languages
‘C’ language ‘C’ language
‘Pascal’ language Machine language
FORTRAN language
C++ language
ADA language
Compiler: A compiler is a program that reads a program in one
language – the source language and translates into an equivalent
program in another language – the target language.
Loader: A loader is the part of an operating system
that is responsible for loading programs into
memory, preparing them for execution and then
executing them.
The loader is usually a part of the operating
system's kernel and usually is loaded at system
boot time and stays in memory until the system is
rebooted, shut down, or powered off.
Linker: A linker or link editor is a program that
takes one or more objects generated by compilers
and assembles them into a single executable
program.
Linkers can take objects from a collection called a
library. The objects are program modules
containing machine code and information for the
linker.
The linker takes care of arranging the objects in a
program's address space.
Interpreter: An interpreter is a computer
program that translates and executes
instructions written in a computer
programming language line-by-line, unit by
unit etc.,
An interpreter needs to be able to analyze,
or parse, instructions written in the source
language.
Example: Lisp systems, etc.,
Word Processors:
Word processing is a tool that helps user in
creating, editing, and printing documents. Word
processors will normally have the following
capabilities built into them:
 Spell checking
 Standard layouts for normal documents
 Have some characters appear in bold print,
italics, or underlined
 Center lines, make text line up on the left
side of the paper, or the right side of the
paper
 Save the document so it can be used again
 print the document.
Examples: WordPerfect and Microsoft Word
Spreadsheets: The spreadsheet packages are
designed to use numbers and formulas to do
calculations with ease. Examples of spreadsheets
include:
 Budgets
 Payrolls
 Grade Calculations
 Address Lists
The most commonly used spreadsheet programs
are Microsoft Excel and Lotus 123.
Graphic Presentations: The presentation
programs can make giving presentations and using
overheads easier. Other uses include:
 Slide Shows
 Repeating Computer Presentations on a
computer monitor
 Using Sound and animation in slide shows
The most recognized graphic presentation
programs are Microsoft PowerPoint and Harvard
Graphics.
 CPU logic is usually faster than main memory
access time, with the result that processing speed
is limited primarily by the speed of main memory
 The cache is used for storing segments of
programs currently being executed in the CPU and
temporary data frequently needed in the present
calculations
 The typical access time ratio between cache and
main memory is about 1to7
 Auxiliary memory access time is usually 1000 times
that of main memory
 Most of the main memory in a general
purpose computer is made up of RAM
integrated circuits chips, but a portion of
the memory may be constructed with ROM
chips
 RAM– Random Access memory
◦ Integated RAM are available in two possible
operating modes, Static and Dynamic
 ROM– Read Only memory

Read/write memory, that initially doesn’t contain any data
 The computing system that it is used in usually stores data at
various locations to retrieve it latter from these locations

Its data pins are bidirectional (data can flow into or out of the
chip via these pins), as opposite to those of ROM that are
output only

It loses its data once the power is removed, so it is a volatile
memory
 It has a directional select signal R/W’; When R/W’=1, the chip
outputs data to the rest of the circuit; when R/W’ = 0 it inputs
data from the rest of the circuit
 Static RAM (SRAM)
◦ Each cell stores bit with a six-transistor (Diode) circuit.
◦ Retains value indefinitely, as long as it is kept powered.
◦ Relatively insensitive to disturbances such as electrical noise.
◦ Faster and more expensive than DRAM.
 Dynamic RAM (DRAM)
◦ Each cell stores bit with a capacitor and transistor.
◦ Value must be refreshed every 10-100 ms.
◦ Sensitive to disturbances.
◦ Slower and cheaper than SRAM.
 ROM is used for storing programs that are
PERMENTLY resident in the computer and
for tables of constants that do not change
in value once the production of the
computer is completed
 The ROM portion of main memory is needed
for storing an initial program called
bootstrap loader, witch is to start the
computer software operating when power is
turned off
 Masked ROM – programmed with its data when the chip is fabricated
 PROM – programmable ROM, by the user using a standard PROM programmer, by
burning some special type of fuses. Once programmed will not be possible to program
it again

EPROM – erasable ROM; the chip can be erased and chip reprogrammed; programming
process consists in charging some internal capacitors; the UV light (method of erase)
makes those capacitors to leak their charge, thus resetting the chip
 EEPROM – Electrically Erasable PROM; it is possible to modify individual locations of the
memory, leaving others unchanged; one common use of the EEPROM is in BIOS of
personal computers.

DRAM and SRAM are volatile memories

Lose information if powered off.
 Nonvolatile memories retain value even if powered off.

Generic name is read-only memory (ROM).

Misleading because some ROMs can be read and modified.
 Types of ROMs

Programmable ROM (PROM)

Eraseable programmable ROM (EPROM)

Electrically eraseable PROM (EEPROM)

Flash memory
 The main memory construction is costly. Therefore, it has
to be limited in size. The main memory is used to store only
those instructions and data which are to be used
immediately. However, a computer has to store a large
amount of information. The bulk of information is stored in
the auxiliary memory. This is also called backing storageor
secondary storage. They include hard disk, floppy
disks, CD-ROM, USB flash drives, etc.
 When the electricity supply to the computer is off, all data
stored in the primary storage is destroyed. On the other
hand, this is not true for secondary storage. The data stored
in secondary storage can be stored for the desired time.
 Firmware:-
It is pre-written program in machine language
that is stored in ROM (Read Only Memory).
Example:-BIOS.Firmware boots up computerized
devices.
 Humanware:-
The personnel which are related to installation,
maintenance, operation and testing of computer
are called humanware.
Example:-Programmer, Hardware/Network
Engineers, System Analysts
40

More Related Content

What's hot

Chap2 comp architecture
Chap2 comp architectureChap2 comp architecture
Chap2 comp architectureraksharao
 
The Basic Organization of Computers
The Basic Organization of ComputersThe Basic Organization of Computers
The Basic Organization of ComputersTallat Satti
 
Unit 4-input-output organization
Unit 4-input-output organizationUnit 4-input-output organization
Unit 4-input-output organizationvishal choudhary
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II Embeded Hardware
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II  Embeded HardwareSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II  Embeded Hardware
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II Embeded HardwareArti Parab Academics
 
Computer
ComputerComputer
ComputerCAFE91
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of compgaurav jain
 
Hardware I/O organization
Hardware  I/O organization Hardware  I/O organization
Hardware I/O organization faria_khan
 
Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System ArchitectureBrenda Debra
 
COMPUTER ORGANIZATION NOTES Unit 3 4
COMPUTER ORGANIZATION NOTES  Unit 3 4COMPUTER ORGANIZATION NOTES  Unit 3 4
COMPUTER ORGANIZATION NOTES Unit 3 4Dr.MAYA NAYAK
 
Computer Organisation (DFT1113)
Computer Organisation (DFT1113)Computer Organisation (DFT1113)
Computer Organisation (DFT1113)PSMZA
 
Computer organization
Computer organizationComputer organization
Computer organizationishapadhy
 
COMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESCOMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESDr.MAYA NAYAK
 
Computer Organization and Architecture 10th Edition by Stallings Test Bank
Computer Organization and Architecture 10th Edition by Stallings Test BankComputer Organization and Architecture 10th Edition by Stallings Test Bank
Computer Organization and Architecture 10th Edition by Stallings Test Bankrohalcabaye
 

What's hot (20)

Chap2 comp architecture
Chap2 comp architectureChap2 comp architecture
Chap2 comp architecture
 
The Basic Organization of Computers
The Basic Organization of ComputersThe Basic Organization of Computers
The Basic Organization of Computers
 
Input & Output
Input & OutputInput & Output
Input & Output
 
Unit 4-input-output organization
Unit 4-input-output organizationUnit 4-input-output organization
Unit 4-input-output organization
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II Embeded Hardware
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II  Embeded HardwareSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II  Embeded Hardware
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT II Embeded Hardware
 
Computer
ComputerComputer
Computer
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of comp
 
Processor Basics
Processor BasicsProcessor Basics
Processor Basics
 
Intro to cao &store program
Intro to cao &store programIntro to cao &store program
Intro to cao &store program
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Hardware I/O organization
Hardware  I/O organization Hardware  I/O organization
Hardware I/O organization
 
CPU
CPUCPU
CPU
 
Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System Architecture
 
Unit3 input
Unit3 inputUnit3 input
Unit3 input
 
COMPUTER ORGANIZATION NOTES Unit 3 4
COMPUTER ORGANIZATION NOTES  Unit 3 4COMPUTER ORGANIZATION NOTES  Unit 3 4
COMPUTER ORGANIZATION NOTES Unit 3 4
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Computer Organisation (DFT1113)
Computer Organisation (DFT1113)Computer Organisation (DFT1113)
Computer Organisation (DFT1113)
 
Computer organization
Computer organizationComputer organization
Computer organization
 
COMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESCOMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTES
 
Computer Organization and Architecture 10th Edition by Stallings Test Bank
Computer Organization and Architecture 10th Edition by Stallings Test BankComputer Organization and Architecture 10th Edition by Stallings Test Bank
Computer Organization and Architecture 10th Edition by Stallings Test Bank
 

Similar to Unit2fit

Similar to Unit2fit (20)

computer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfcomputer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdf
 
Cpu
CpuCpu
Cpu
 
Pankaj kumar
Pankaj kumar Pankaj kumar
Pankaj kumar
 
INSTRUCTION TYPES
INSTRUCTION TYPESINSTRUCTION TYPES
INSTRUCTION TYPES
 
Computer basics and i.o devices
Computer basics and i.o devicesComputer basics and i.o devices
Computer basics and i.o devices
 
Multilevel arch & str org.& mips, 8086, memory
Multilevel arch & str org.& mips, 8086, memoryMultilevel arch & str org.& mips, 8086, memory
Multilevel arch & str org.& mips, 8086, memory
 
COA-Unit-1-Basics.ppt
COA-Unit-1-Basics.pptCOA-Unit-1-Basics.ppt
COA-Unit-1-Basics.ppt
 
Cliff sugerman
Cliff sugermanCliff sugerman
Cliff sugerman
 
Components of a digital computer.ppt
Components of a digital computer.pptComponents of a digital computer.ppt
Components of a digital computer.ppt
 
C with lab
C with labC with lab
C with lab
 
Computer System.ppt
Computer System.pptComputer System.ppt
Computer System.ppt
 
Microcontroller part 1
Microcontroller part 1Microcontroller part 1
Microcontroller part 1
 
Components of a computer
Components of a computerComponents of a computer
Components of a computer
 
DLD1.pdf
DLD1.pdfDLD1.pdf
DLD1.pdf
 
Computer-Processing-Devices.pdf
Computer-Processing-Devices.pdfComputer-Processing-Devices.pdf
Computer-Processing-Devices.pdf
 
Basic-Role-of-Operating-System-send.pptx
Basic-Role-of-Operating-System-send.pptxBasic-Role-of-Operating-System-send.pptx
Basic-Role-of-Operating-System-send.pptx
 
unit-i.pdf
unit-i.pdfunit-i.pdf
unit-i.pdf
 
The system unit
The system unitThe system unit
The system unit
 
System Programming- Unit I
System Programming- Unit ISystem Programming- Unit I
System Programming- Unit I
 
5.6 Basic computer structure microprocessors
5.6 Basic computer structure   microprocessors5.6 Basic computer structure   microprocessors
5.6 Basic computer structure microprocessors
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Unit2fit

  • 1.  Registers hold data that can be readily accessed by the CPU.  They can be implemented using D flip-flops. ◦ A 32-bit register requires 32 D flip-flops.  The arithmetic-logic unit (ALU) carries out logical and arithmetic operations as directed by the control unit.  The control unit determines which actions to carry out according to the values in a program counter register and a status register. 1
  • 2.  Buses consist of data lines, control lines, and address lines.  While the data lines convey bits from one device to another, control lines determine the direction of data flow, and when each device can access the bus.  Address lines determine the location of the source or destination of the data. 2 The next slide shows a model bus configuration.
  • 3. 3
  • 4.  Every computer contains at least one clock that synchronizes the activities of its components.  A fixed number of clock cycles are required to carry out each data movement or computational operation.  The clock frequency, measured in megahertz or gigahertz, determines the speed with which all operations are carried out.  Clock cycle time is the reciprocal of clock frequency. ◦ An 800 MHz clock has a cycle time of 1.25 ns. 4
  • 5.  A computer communicates with the outside world through its input/output (I/O) subsystem.  I/O devices connect to the CPU through various interfaces.  I/O can be memory-mapped-- where the I/O device behaves like main memory from the CPU’s point of view.  Or I/O can be instruction-based, where the CPU has a specialized I/O instruction set. 5
  • 6.  Computer memory consists of a linear array of addressable storage cells that are similar to registers.  Memory can be byte-addressable, or word- addressable, where a word typically consists of two or more bytes.  Memory is constructed of RAM chips, often referred to in terms of length  width.  If the memory word size of the machine is 16 bits, then a 4M  16 RAM chip gives us 4 megabytes of 16-bit memory locations. 6
  • 7.  How does the computer access a memory location corresponds to a particular address?  We observe that 4M can be expressed as 2 2  2 20 = 2 22 words.  The memory locations for this memory are numbered 0 through 2 22 -1.  Thus, the memory bus of this system requires at least 22 address lines. ◦ The address lines “count” from 0 to 222 - 1 in binary. Each line is either “on” or “off” indicating the location of the desired memory element. 7
  • 8.  The normal execution of a program is altered when an event of higher-priority occurs. The CPU is alerted to such an event through an interrupt.  Interrupts can be triggered by I/O requests, arithmetic errors (such as division by zero), or when an invalid instruction is encountered.  Each interrupt is associated with a procedure that directs the actions of the CPU when an interrupt occurs. ◦ Nonmaskable interrupts are high-priority interrupts that cannot be ignored. 8
  • 9. seven registers are: • Accumulator, AC, a 16-bit register that holds a conditional operator (e.g., "less than") or one operand of a two-operand instruction. • Memory address register, MAR, a 12-bit register that holds the memory address of an instruction or the operand of an instruction. • Memory buffer register, MBR, a 16-bit register that holds the data after its retrieval from, or before its placement in memory. 9
  • 10. seven registers are: • Program counter, PC, a 12-bit register that holds the address of the next program instruction to be executed. • Instruction register, IR, which holds an instruction immediately preceding its execution. • Input register, InREG, an 8-bit register that holds data read from an input device. • Output register, OutREG, an 8-bit register, that holds data that is ready for the output device. 10
  • 11. A computer goes through the following instruction cycle repeatedly: do 1. Fetch an instruction from memory 2. Decode the instruction 3. Read the effective address from memory if the instruction has an indirect address 4. Execute the instruction until a HALT instruction is encountered 11
  • 12.  The fetch-decode-execute cycle is the series of steps that a computer carries out when it runs a program.  We first have to fetch an instruction from memory, and place it into the IR.  Once in the IR, it is decoded to determine what needs to be done next.  If a memory value (operand) is involved in the operation, it is retrieved and placed into the MBR.  With everything in place, the instruction is executed. 12 The next slide shows a flowchart of this process.
  • 13. 13
  • 14.  All computers provide a way of interrupting the fetch-decode-execute cycle.  Interrupts occur when: ◦ A user break (e.,g., Control+C) is issued ◦ I/O is requested by the user or a program ◦ A critical error occurs  Interrupts can be caused by hardware or software. ◦ Software interrupts are also called traps. 14
  • 15.  Interrupt processing involves adding another step to the fetch-decode-execute cycle as shown below. 15 The next slide shows a flowchart of “Process the interrupt.”
  • 16. 16
  • 17.  For general-purpose systems, it is common to disable all interrupts during the time in which an interrupt is being processed. ◦ Typically, this is achieved by setting a bit in the flags register.  Interrupts that are ignored in this case are called maskable.  Nonmaskable interrupts are those interrupts that must be processed in order to keep the system in a stable condition. 17
  • 18.
  • 19.  Computer Instructions or data, anything that can be stored electronically is Software.  Hardware is one that is tangible. The storage devices (Hard disk, CD’s etc.,), mouse, keyboard CPU and display devices (Monitor) are Hardware. For example: There is a problem in the Software implies – Problem with program or data
  • 21. System Software includes the Operating System and all the utilities that enable the computer to function.  Are a set of programs which are meant not only for the computer operation but also for the effective utilization of the computer hardware.  In other words system software are a set of program which are used for controlling the computer hardware and for interfacing, interconnecting the various resources of computer system in an optimal way. Example: Operating Systems, Compiler, Loader, Linker, Interpreter.
  • 22. A set of program comprising various modules that are written for specific application Application Software includes programs that do real work for user. Example: Payroll systems, Inventory Control, Manage student database, Word Processor, Spreadsheet and Database Management System etc.,
  • 23. Operating System:  Operating System is a software, which makes a computer to actually work.  It is the software the enables all the programs we use.  The OS organizes and controls the hardware.  OS acts as an interface between the application programs and the machine hardware.  Examples: Windows, Linux, Unix and Mac OS, etc.,
  • 24. Source Languages Target Languages ‘C’ language ‘C’ language ‘Pascal’ language Machine language FORTRAN language C++ language ADA language Compiler: A compiler is a program that reads a program in one language – the source language and translates into an equivalent program in another language – the target language.
  • 25. Loader: A loader is the part of an operating system that is responsible for loading programs into memory, preparing them for execution and then executing them. The loader is usually a part of the operating system's kernel and usually is loaded at system boot time and stays in memory until the system is rebooted, shut down, or powered off.
  • 26. Linker: A linker or link editor is a program that takes one or more objects generated by compilers and assembles them into a single executable program. Linkers can take objects from a collection called a library. The objects are program modules containing machine code and information for the linker. The linker takes care of arranging the objects in a program's address space.
  • 27. Interpreter: An interpreter is a computer program that translates and executes instructions written in a computer programming language line-by-line, unit by unit etc., An interpreter needs to be able to analyze, or parse, instructions written in the source language. Example: Lisp systems, etc.,
  • 28. Word Processors: Word processing is a tool that helps user in creating, editing, and printing documents. Word processors will normally have the following capabilities built into them:  Spell checking  Standard layouts for normal documents  Have some characters appear in bold print, italics, or underlined  Center lines, make text line up on the left side of the paper, or the right side of the paper  Save the document so it can be used again  print the document. Examples: WordPerfect and Microsoft Word
  • 29. Spreadsheets: The spreadsheet packages are designed to use numbers and formulas to do calculations with ease. Examples of spreadsheets include:  Budgets  Payrolls  Grade Calculations  Address Lists The most commonly used spreadsheet programs are Microsoft Excel and Lotus 123.
  • 30. Graphic Presentations: The presentation programs can make giving presentations and using overheads easier. Other uses include:  Slide Shows  Repeating Computer Presentations on a computer monitor  Using Sound and animation in slide shows The most recognized graphic presentation programs are Microsoft PowerPoint and Harvard Graphics.
  • 31.  CPU logic is usually faster than main memory access time, with the result that processing speed is limited primarily by the speed of main memory  The cache is used for storing segments of programs currently being executed in the CPU and temporary data frequently needed in the present calculations  The typical access time ratio between cache and main memory is about 1to7  Auxiliary memory access time is usually 1000 times that of main memory
  • 32.
  • 33.  Most of the main memory in a general purpose computer is made up of RAM integrated circuits chips, but a portion of the memory may be constructed with ROM chips  RAM– Random Access memory ◦ Integated RAM are available in two possible operating modes, Static and Dynamic  ROM– Read Only memory
  • 34.  Read/write memory, that initially doesn’t contain any data  The computing system that it is used in usually stores data at various locations to retrieve it latter from these locations  Its data pins are bidirectional (data can flow into or out of the chip via these pins), as opposite to those of ROM that are output only  It loses its data once the power is removed, so it is a volatile memory  It has a directional select signal R/W’; When R/W’=1, the chip outputs data to the rest of the circuit; when R/W’ = 0 it inputs data from the rest of the circuit
  • 35.  Static RAM (SRAM) ◦ Each cell stores bit with a six-transistor (Diode) circuit. ◦ Retains value indefinitely, as long as it is kept powered. ◦ Relatively insensitive to disturbances such as electrical noise. ◦ Faster and more expensive than DRAM.  Dynamic RAM (DRAM) ◦ Each cell stores bit with a capacitor and transistor. ◦ Value must be refreshed every 10-100 ms. ◦ Sensitive to disturbances. ◦ Slower and cheaper than SRAM.
  • 36.  ROM is used for storing programs that are PERMENTLY resident in the computer and for tables of constants that do not change in value once the production of the computer is completed  The ROM portion of main memory is needed for storing an initial program called bootstrap loader, witch is to start the computer software operating when power is turned off
  • 37.  Masked ROM – programmed with its data when the chip is fabricated  PROM – programmable ROM, by the user using a standard PROM programmer, by burning some special type of fuses. Once programmed will not be possible to program it again  EPROM – erasable ROM; the chip can be erased and chip reprogrammed; programming process consists in charging some internal capacitors; the UV light (method of erase) makes those capacitors to leak their charge, thus resetting the chip  EEPROM – Electrically Erasable PROM; it is possible to modify individual locations of the memory, leaving others unchanged; one common use of the EEPROM is in BIOS of personal computers.
  • 38.  DRAM and SRAM are volatile memories  Lose information if powered off.  Nonvolatile memories retain value even if powered off.  Generic name is read-only memory (ROM).  Misleading because some ROMs can be read and modified.  Types of ROMs  Programmable ROM (PROM)  Eraseable programmable ROM (EPROM)  Electrically eraseable PROM (EEPROM)  Flash memory
  • 39.  The main memory construction is costly. Therefore, it has to be limited in size. The main memory is used to store only those instructions and data which are to be used immediately. However, a computer has to store a large amount of information. The bulk of information is stored in the auxiliary memory. This is also called backing storageor secondary storage. They include hard disk, floppy disks, CD-ROM, USB flash drives, etc.  When the electricity supply to the computer is off, all data stored in the primary storage is destroyed. On the other hand, this is not true for secondary storage. The data stored in secondary storage can be stored for the desired time.
  • 40.  Firmware:- It is pre-written program in machine language that is stored in ROM (Read Only Memory). Example:-BIOS.Firmware boots up computerized devices.  Humanware:- The personnel which are related to installation, maintenance, operation and testing of computer are called humanware. Example:-Programmer, Hardware/Network Engineers, System Analysts 40