Al Mansour University College
Software Engineering department
2nd stage
Microprocessors
Lec: Wael Esam Matti
by :
Tuqa Aqeel, Mayada Hazem , Zahraa Abdulkadem, Dyar Ahmed .
Introduction of Motorola microprocessors
Designers
Motorola microprocessor family
Motorola 6800 Microprocessor Family
Variations of 6800
Motorola 680x0 Microprocessor Family
Motorola PowerPC Family
Features of MC6800 Microprocessor
Memory of MC6800 Microprocessor
Throughout history, new and improved technologies have transformed the human experience. In the 20th century, the pace of change sped up radically as we entered the computing age. For nearly 40 years Intel innovations have continuously created new possibilities in the lives of people around the world.
based on stored program design
processor system
CPU
memory
input/output system
input/output devices
secondary storage
manages the instruction-execution cycle
FETCH – DECODE – EXECUTE
coordinates the activities of other devices
Logical instructions in assembly language for 8086 processor. Instructions covered are AND, OR, XOR, NOT and Test instruction. Effect on flags is discussed.
Al Mansour University College
Software Engineering department
2nd stage
Microprocessors
Lec: Wael Esam Matti
by :
Tuqa Aqeel, Mayada Hazem , Zahraa Abdulkadem, Dyar Ahmed .
Introduction of Motorola microprocessors
Designers
Motorola microprocessor family
Motorola 6800 Microprocessor Family
Variations of 6800
Motorola 680x0 Microprocessor Family
Motorola PowerPC Family
Features of MC6800 Microprocessor
Memory of MC6800 Microprocessor
Throughout history, new and improved technologies have transformed the human experience. In the 20th century, the pace of change sped up radically as we entered the computing age. For nearly 40 years Intel innovations have continuously created new possibilities in the lives of people around the world.
based on stored program design
processor system
CPU
memory
input/output system
input/output devices
secondary storage
manages the instruction-execution cycle
FETCH – DECODE – EXECUTE
coordinates the activities of other devices
Logical instructions in assembly language for 8086 processor. Instructions covered are AND, OR, XOR, NOT and Test instruction. Effect on flags is discussed.
It is a presentation for the Embedded System Basics. It will be very useful for the engineering students who need to know the basics of Embedded System.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
Deadlocks operating system To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks
To present a number of different methods for preventing, avoiding, or detecting deadlocks in a computer system
e.t.c
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
5. CISC
• Majority of the processors used in desktop machines are CISC processors.
• Now the question is that:
What is Desktop Machine?
A desktop machine is a computer that is designed to stay in a single location. It
may be a tower ( also known as a system unit ) or in all-in-one machine , such
as an iMac.
6. Name(Continued)
What is Microprocessor?
A microprocessor , sometimes called a logic chip,
The microprocessor contain all , or most of the functions of CPU.
Microprocessor is the engine that goes into motion when you turn your
computer on,
A microprocessor is designed to perform arithmetic and logic operations
7. History
• This processor is formed in 1979 by development team of Motorola
When we hear about named Motorola the very next thing in our mind comes
out its an organization which makes mobile but the reality is that this
organization actually knows for there processor more as compared to their
mobility work.
8. Reason Of Manufacturing
This processor is formed for house hold usage means this processor helps to
personal computer to provide some better functionalities.
The most well known face of or usage of MC68000 is in the game of SEGA
organization all of the games launched by this development team are based on
this processor.
9. Reason(Continued)
The major reason of this processor is to compete with their traditional rivalries
intel.
This processor is formed to compete with Intel 8086 and there is a big
competition is saw between of them but no doubt they make a new era of
gaming at home.
12. External Architecture
It contains 64 pins and with help of this we embed this
microprocessor on the systems and this processor perform
communication with other parts of a system with these
pins. Not only that these are connected with some register
inside the processor.
14. Data Registers
• This segment contain 8 registers D0-D7.
• This segment has the size of 32 bit.
• The major work done in this segment is data Manipulation and we can
manipulate data using different operations.
16. Address Register
• This segment contain 8 registers A0-A7, while A7 is divided into 2 parts.
• The address registers are used to store addresses of locations in main
memory. In other words, address registers are pointers to locations in
memory.
• These registers are used as addressing mode in MC68000
17. Address Register(Continued)
• In this segment we use actually nine register as you seen in previous picture
we have two parts of A7 register.
• This register contain stack pointers. And there is two stack pointers due to
its privilege state.
18. What is Privilege State?
One of the best specification of MC68000 is that this processor can be
supervised by system or user.
Privilege state describes that is it the control in the hands of user or system,
both of them has their own stacks and their own pointers which can’t be used
at the same time therefore it lie in the same register.
19. Internal Architecture(Continued)
3rd Segment
• It contains the detail about which instruction to be send to process in processor.
• Its 1st 24 bits are used in initial implementation while remaining 8 can be manipulated.
20. Internal Architecture(Continued)
4th Segment
• This segment is often named as Condition Code Register or Status Register.
• In this we have number of flags used to perform some simple operations.
21. Data Manipulation
MC 68000 support limited data types and manipulate only that data which has
following data types:
• Integer (ADD, SUBTRACT, MULTIPLY, DIVIDE,' NEGATE, COMPARE)
• Logical (AND, OR, EXCLUSIVE OR COMPLEMENT, COMPARE)
• Boolean (AND, OR, EXCLUSIVE OR, COMPLEMENT)
• Bit (SET, CLEAR, CHANGE)
• String (STRING MOVE, STRING SEARCH)
22. 8086 vs 68000
8086 68000
• Contains 14 (16 bit) registers . contains 18 (32 bit) & 1 (16 bit) registers.
• Four of which can be used as 8 (32 bit) data registers named D0 to D7.
two eight-bit registers. Seven (32 bit) address registers, names as A0 to
• Four “general purpose” registers A7.
Called AX , BX , CX, DX. Has (32 bit) pc.
There two halves can be referenced Two (32 bit) stack pointers USP or A7 used in
As (8 bit) AH, AL, BH, BL, CH, CL, DH user mode & SSP or A7 used in Supervisor mode.
DL.
23. Continued
8086 68000
Has four (16 bit) index registers called (16 bit) status register (flag)
called SP, BP, SI, DI.
(16 bit) PC registers .
Four Segment registers called CS, DS, SS
ES.
(16 bit) status register (flag)
24. continued
8086 68000
Addressing mode Addressing mode
Have 12 general ways 8 general ways.
Instruction sets Instruction sets
SBB (subtract) SUBX(subtract).
MOV MOVE
Addressing Mode (An Addressing Mode defines how a machine language Instruction in any computer architecture identify the operands of each instruction)
Bit 0, known as the C bit, is the carry bit. (It is set (to 1) whenever the result of an operation generates a carry)
Bit 1, known as the V bit, is the overflow bit. (It is set if an operation results in arithmetic overflow in terms of two's complement arithmetic)
Bit 2, known as the Z bit, is the zero bit. (It is set when the result of an operation is zero)
Bit 3, known as the N bit, is the negative bit. (It is set when the result of an operation is negative)
Bit 4, known as the X bit, is the extend bit. (It often has the same value as the C bit.)