SlideShare a Scribd company logo
1 of 16
Introduction to Computing Systems
from bits & gates to C & beyond
Chapter 1
Welcome Aboard!
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 2
• What computers consist of
• How computers work
• How they are organized
internally
• What are the design tradeoffs
• How design affects
programming and applications
• How to fix computers
• How to build myself one
real cheap
• Which one to buy
• Knowing all about the
Pentium IV or PowerPC
This course is about:
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 3
Computing Machines
 Ubiquitous ( = everywhere)
 General purpose: servers, desktops, laptops, PDAs, etc.
 Special purpose: cash registers, ATMs, games, telephone
switches, etc.
 Embedded: cars, hotel doors, printers, VCRs, industrial
machinery, medical equipment, etc.
 Distinguishing Characteristics
 Speed
 Cost
 Ease of use, software support & interface
 Scalability
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 4
Two recurring themes
 Abstraction
The notion that we can concentrate on one “level” of the big
picture at a time, with confidence that we can then connect
effectively with the levels above and below.
Framing the levels of abstraction appropriately is one of the most
important skills in any undertaking.
 Hardware vs. Software
On the other hand, abstraction does not mean being clueless
about the neighboring levels.
In particular, hardware and software are inseparably connected,
especially at the level we will be studying.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 5
What is Computer Organization?
… a very wide semantic gap between the intended behavior and the
workings of the underlying electronic devices that will actually do
all the work.
The forerunners to modern computers attempted to assemble the raw
devices (mechanical, electrical, or electronic) into a separate
purpose-built machine for each desired behavior.
Electronic
Devices
Desired
Behavior
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 6
Role of General Purpose Computers
A general purpose computer is like an island that helps span the gap
between the desired behavior (application) and the basic building
blocks (electronic devices).
Electronic
Devices
Desired
Behavior
General
Purpose
Computer
computer
organization
software
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 7
CPUs: the heart of computing systems
ca 1980
It took 10 of these boards to
make a Central Processing Unit
ca 2000
You can see why they called
this CPU a microprocessor!
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 8
Two pillars of Computing
 Universal Computational Devices
 Given enough time and memory, all computers are capable of
computing exactly the same things (irrespective of speed, size or
cost).
 Turing’s Thesis: every computation can be performed by some
“Turing Machine” - a theoretical universal computational device
 Problem Transformation
 The ultimate objective is to transform a problem expressed in
natural language into electrons running around a circuit!
 That’s what Computer Science and Computer Engineering are all
about: a continuum that embraces software & hardware.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 9
A Turing Machine
Also known as a Universal Computational Device: a theoretical
device that accepts both input data and instructions as to how to
operate on the data
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 10
Problem Transformation
- levels of abstraction
Natural Language
Algorithm
Program
Machine Architecture
Devices
Micro-architecture
Logic Circuits
The desired behavior:
the application
The building blocks:
electronic devices
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 11
Levels of Abstraction
 These levels do not necessarily correspond
to discrete components, but to well defined
standard interfaces.
 Standard interfaces provide
 portability
 third party software/hardware
 wider usage
 These levels are to some extent arbitrary -
there are other ways to draw the lines.
Natural Language
Algorithm
Program
Machine Architecture
Devices
Micro-architecture
Logic Circuits
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 12
The Program Level
 Most computers run a management
program called the operating system
(OS).
 Application programs interface to the
machine architecture via the OS.
An example:
Application Program
Operating System
Program (Software)
This lecture
PowerPoint
Windows XP
Data
Application Program
Operating System
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 13
The Machine Level - 1
 Machine Architecture
This is the formal specification of all the functions a particular
machine can carry out, known as the Instruction Set Architecture
(ISA).
 Microarchitecture
The implementation of the ISA in a specific CPU - i.e. the way in
which the specifications of the ISA are actually carried out.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 14
The Machine Level - 2
 Logic Circuits
Each functional component of the microarchitecture is built up of
circuits that make “decisions” based on simple rules
 Devices
Finally, each logic circuit is actually built of electronic devices
such as CMOS or NMOS or GaAs (etc.) transistors.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 15
Course Outline - What is Next?
 How to represent information
 The building blocks of computers: logic gates
 The basic algorithm: the von Neumann model
 An example: the LC-3 structure and language
 Programming the machine: assembly language
 A higher-level language: C
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
What is next?
1 - 16

More Related Content

Similar to Technology technology.ppt

aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cvwaleed seif
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorialcybercbm
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data ratesPacket Storm
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdfJohn Archer
 
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions ManualIntroduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions ManualBradleyNoels
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computingppd1961
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering JayaKamal
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II TechMike Sawall
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)Soetam Rizky
 
Career in computer Hardware & Networking
Career in computer Hardware & NetworkingCareer in computer Hardware & Networking
Career in computer Hardware & NetworkingNavjotKaur124
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015Aron Kondoro
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossaryOtarola93
 

Similar to Technology technology.ppt (20)

aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cv
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorial
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
 
U2
U2U2
U2
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
 
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions ManualIntroduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computing
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
Embedded C workshop
Embedded C workshopEmbedded C workshop
Embedded C workshop
 
Career in computer Hardware & Networking
Career in computer Hardware & NetworkingCareer in computer Hardware & Networking
Career in computer Hardware & Networking
 
Architecture presentation
Architecture presentationArchitecture presentation
Architecture presentation
 
ResumeRossNagarasan
ResumeRossNagarasanResumeRossNagarasan
ResumeRossNagarasan
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
1. computers introduction
1. computers introduction1. computers introduction
1. computers introduction
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossary
 

More from sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).pptsheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxsheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.pptsheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.pptsheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptsheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptxsheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptxsheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.pptsheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfsheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxsheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptsheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdfsheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.pptsheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.pptsheryl90
 

More from sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Technology technology.ppt

  • 1. Introduction to Computing Systems from bits & gates to C & beyond Chapter 1 Welcome Aboard!
  • 2. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 2 • What computers consist of • How computers work • How they are organized internally • What are the design tradeoffs • How design affects programming and applications • How to fix computers • How to build myself one real cheap • Which one to buy • Knowing all about the Pentium IV or PowerPC This course is about:
  • 3. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 3 Computing Machines  Ubiquitous ( = everywhere)  General purpose: servers, desktops, laptops, PDAs, etc.  Special purpose: cash registers, ATMs, games, telephone switches, etc.  Embedded: cars, hotel doors, printers, VCRs, industrial machinery, medical equipment, etc.  Distinguishing Characteristics  Speed  Cost  Ease of use, software support & interface  Scalability
  • 4. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 4 Two recurring themes  Abstraction The notion that we can concentrate on one “level” of the big picture at a time, with confidence that we can then connect effectively with the levels above and below. Framing the levels of abstraction appropriately is one of the most important skills in any undertaking.  Hardware vs. Software On the other hand, abstraction does not mean being clueless about the neighboring levels. In particular, hardware and software are inseparably connected, especially at the level we will be studying.
  • 5. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 5 What is Computer Organization? … a very wide semantic gap between the intended behavior and the workings of the underlying electronic devices that will actually do all the work. The forerunners to modern computers attempted to assemble the raw devices (mechanical, electrical, or electronic) into a separate purpose-built machine for each desired behavior. Electronic Devices Desired Behavior
  • 6. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 6 Role of General Purpose Computers A general purpose computer is like an island that helps span the gap between the desired behavior (application) and the basic building blocks (electronic devices). Electronic Devices Desired Behavior General Purpose Computer computer organization software
  • 7. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 7 CPUs: the heart of computing systems ca 1980 It took 10 of these boards to make a Central Processing Unit ca 2000 You can see why they called this CPU a microprocessor!
  • 8. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 8 Two pillars of Computing  Universal Computational Devices  Given enough time and memory, all computers are capable of computing exactly the same things (irrespective of speed, size or cost).  Turing’s Thesis: every computation can be performed by some “Turing Machine” - a theoretical universal computational device  Problem Transformation  The ultimate objective is to transform a problem expressed in natural language into electrons running around a circuit!  That’s what Computer Science and Computer Engineering are all about: a continuum that embraces software & hardware.
  • 9. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 9 A Turing Machine Also known as a Universal Computational Device: a theoretical device that accepts both input data and instructions as to how to operate on the data
  • 10. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 10 Problem Transformation - levels of abstraction Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits The desired behavior: the application The building blocks: electronic devices
  • 11. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 11 Levels of Abstraction  These levels do not necessarily correspond to discrete components, but to well defined standard interfaces.  Standard interfaces provide  portability  third party software/hardware  wider usage  These levels are to some extent arbitrary - there are other ways to draw the lines. Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits
  • 12. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 12 The Program Level  Most computers run a management program called the operating system (OS).  Application programs interface to the machine architecture via the OS. An example: Application Program Operating System Program (Software) This lecture PowerPoint Windows XP Data Application Program Operating System
  • 13. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 13 The Machine Level - 1  Machine Architecture This is the formal specification of all the functions a particular machine can carry out, known as the Instruction Set Architecture (ISA).  Microarchitecture The implementation of the ISA in a specific CPU - i.e. the way in which the specifications of the ISA are actually carried out.
  • 14. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 14 The Machine Level - 2  Logic Circuits Each functional component of the microarchitecture is built up of circuits that make “decisions” based on simple rules  Devices Finally, each logic circuit is actually built of electronic devices such as CMOS or NMOS or GaAs (etc.) transistors.
  • 15. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 15 Course Outline - What is Next?  How to represent information  The building blocks of computers: logic gates  The basic algorithm: the von Neumann model  An example: the LC-3 structure and language  Programming the machine: assembly language  A higher-level language: C
  • 16. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside What is next? 1 - 16