SlideShare a Scribd company logo
IBM PC Assembly Language and Programming by Peter AbelChapter 1: Basic Feature of PC hardware Mohammed Nazimuddin(나짐)  Email:nazim@eslab.inha.ac.kr 1210 Hi-tech centre.
Hardware Features Internal Hardware Processor Memory Register External hardware Keyboard Monitor Disk CD-ROM
Bits and Bytes Bits  The fundamental building block of computer storage is Bit. A bit may be Off  0 On  1
Bytes A group of nine related bits The eight data bits provide the basis for binary arithmetic and characters ,[object Object],One Bit parity. Rules of Parity Must be odd in each byte ,[object Object],Represents a storage Location
Related Bytes Word 2-Byte(16-bit) Double Word 4-Byte(32-bit) Quadword 8-Byte(64-bit) Paragraph 16-byte(128) Kilobyte(KB) Megabyte(MB)
Number system Binary Base 2 (0,1) Binary to Decimal 01000001 Bits are numbered from the right to left. ,[object Object],Subscripts represent the place value, e.g.  ,[object Object],Conversion to decimal is done by evaluating the polynomial ,[object Object]
In this case, 0+64+0+0+0+0+0+1 = 65,[object Object]
HEXADECIMAL Base 16(0 to 9, A..F) ,[object Object]
Expand each hex digit to the equivalent 4-bit binary form
You may omit leading zeros of leftmost digit
37h = 0011 0111b
(or 110111b)
Binary to Hex
Group bits by fours (starting with least significant bits)
Add leading zeros as necessary to complete the last group
Convert each group to the equivalent hex digit
0100 1110b = 4Eh,[object Object]
Numeric Data Binary storage two’s complement, one’s complement, sign and magnitude, or biased representations ASCII storage sequence of ASCII bytes representing the digits of the number expressed in some radix Binary Coded Decimal sequence of nybbles representing digits 0-9 of the number
Binary Storage A pre-arranged storage size is used typically byte, word, doubleword, or quadword Represent a number in base two and encode the bits 197d is 11000101b at least 8 bits will be required to store this number (leading zeros are added if necessary to fill additional bits for larger storage sizes)
Signed vs Unsigned Codes ,[object Object]
two’s complement code is most common
only 7 bits are used for the magnitude
Minimum -128 is coded as 10000000b
Maximum +127 is coded as 01111111b
Zero is 00000000b
Unsigned Byte
all 8 bits used to represent the magnitude of the number

More Related Content

What's hot

Data representation
Data representationData representation
Data representationrozanadiana
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2Umang Gupta
 
How computers represent data
How computers represent dataHow computers represent data
How computers represent dataShaon Ahmed
 
Data representation
Data representationData representation
Data representation
Prof. Dr. K. Adisesha
 
Chapter 03 number system
Chapter 03 number systemChapter 03 number system
Chapter 03 number systemIIUI
 
Vhdl introduction
Vhdl introductionVhdl introduction
Vhdl introduction
VandanaPagar1
 
Computer Systems Data Representation
Computer Systems   Data RepresentationComputer Systems   Data Representation
Computer Systems Data Representationiarthur
 
Topic 1 Data Representation
Topic 1 Data RepresentationTopic 1 Data Representation
Topic 1 Data Representationekul
 
C:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 BC:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 Bececourse
 
Data representation
Data representationData representation
Data representation
Kaviya Arikrishnan
 
Data representation
Data representationData representation
Data representation
shashikant pabari
 
Data representation
Data representationData representation
Data representation
Mysore
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
Ahmed Saber
 
Logic design and switching theory
Logic design and switching theoryLogic design and switching theory
Logic design and switching theory
jomerson remorosa
 
Digital Comprator
Digital CompratorDigital Comprator
Digital Compratorsuraj829
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
sohelranasweet
 
Data representation in computers
Data representation in computersData representation in computers
Data representation in computers
Prof. Dr. K. Adisesha
 
Number system
Number system Number system
Number system
Anirban Saha Anik
 
Data representation moris mano ch 03
Data representation   moris mano ch  03Data representation   moris mano ch  03
Data representation moris mano ch 03
thearticlenow
 

What's hot (20)

Data representation
Data representationData representation
Data representation
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2
 
How computers represent data
How computers represent dataHow computers represent data
How computers represent data
 
Data representation
Data representationData representation
Data representation
 
Chapter 03 number system
Chapter 03 number systemChapter 03 number system
Chapter 03 number system
 
Vhdl introduction
Vhdl introductionVhdl introduction
Vhdl introduction
 
Meghna ppt.
Meghna ppt.Meghna ppt.
Meghna ppt.
 
Computer Systems Data Representation
Computer Systems   Data RepresentationComputer Systems   Data Representation
Computer Systems Data Representation
 
Topic 1 Data Representation
Topic 1 Data RepresentationTopic 1 Data Representation
Topic 1 Data Representation
 
C:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 BC:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 B
 
Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
 
Logic design and switching theory
Logic design and switching theoryLogic design and switching theory
Logic design and switching theory
 
Digital Comprator
Digital CompratorDigital Comprator
Digital Comprator
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Data representation in computers
Data representation in computersData representation in computers
Data representation in computers
 
Number system
Number system Number system
Number system
 
Data representation moris mano ch 03
Data representation   moris mano ch  03Data representation   moris mano ch  03
Data representation moris mano ch 03
 

Viewers also liked

Logo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajnLogo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajn
Total Dizajn Digital
 
Typek flying local flag
Typek flying local flagTypek flying local flag
Typek flying local flag
Cheryl King
 
J.C. Jones quotes
J.C. Jones quotesJ.C. Jones quotes
J.C. Jones quotesLuca Galli
 
Инфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондацииИнфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондации
МЦМС | MCIC
 
dobry dizajn
dobry dizajndobry dizajn
dobry dizajn
Bootstrap
 
Salesguru.Pl na Bootstrapie
Salesguru.Pl na BootstrapieSalesguru.Pl na Bootstrapie
Salesguru.Pl na Bootstrapie
Bootstrap
 
Bosc Intro 20090627
Bosc Intro 20090627Bosc Intro 20090627
Bosc Intro 20090627bosc
 
MiMo09
MiMo09MiMo09
MiMo09semdev
 

Viewers also liked (8)

Logo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajnLogo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajn
 
Typek flying local flag
Typek flying local flagTypek flying local flag
Typek flying local flag
 
J.C. Jones quotes
J.C. Jones quotesJ.C. Jones quotes
J.C. Jones quotes
 
Инфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондацииИнфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондации
 
dobry dizajn
dobry dizajndobry dizajn
dobry dizajn
 
Salesguru.Pl na Bootstrapie
Salesguru.Pl na BootstrapieSalesguru.Pl na Bootstrapie
Salesguru.Pl na Bootstrapie
 
Bosc Intro 20090627
Bosc Intro 20090627Bosc Intro 20090627
Bosc Intro 20090627
 
MiMo09
MiMo09MiMo09
MiMo09
 

Similar to Class2

Module 1-ppt System programming
Module 1-ppt System programmingModule 1-ppt System programming
Module 1-ppt System programming
vishnu sankar
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
saimawarsi
 
6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx
HebaEng
 
system software 16 marks
system software 16 markssystem software 16 marks
system software 16 marks
vvcetit
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs Rev
northVU
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
Siraj Ahmed
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets CharacteristicsJeanie Delos Arcos
 
Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Khaja Dileef
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptx
SachinKupade
 
Intel 8086
Intel 8086 Intel 8086
Intel 8086
Manoj VNV
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadYogesh Deshpande
 
SAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSORSAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
BhawaniShankarSahu1
 
LECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphesLECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphes
AhmedMahjoub15
 
Unit 3 assembler and processor
Unit 3   assembler and processorUnit 3   assembler and processor
Unit 3 assembler and processorAbha Damani
 

Similar to Class2 (20)

Module 1-ppt System programming
Module 1-ppt System programmingModule 1-ppt System programming
Module 1-ppt System programming
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
 
6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx
 
system software 16 marks
system software 16 markssystem software 16 marks
system software 16 marks
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs Rev
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
Wk1to4
Wk1to4Wk1to4
Wk1to4
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptx
 
Intel 8086
Intel 8086 Intel 8086
Intel 8086
 
Coa presentation1
Coa presentation1Coa presentation1
Coa presentation1
 
Chap 01[1]
Chap 01[1]Chap 01[1]
Chap 01[1]
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_upload
 
SAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSORSAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSOR
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
 
LECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphesLECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphes
 
Unit 3 assembler and processor
Unit 3   assembler and processorUnit 3   assembler and processor
Unit 3 assembler and processor
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Class2

  • 1. IBM PC Assembly Language and Programming by Peter AbelChapter 1: Basic Feature of PC hardware Mohammed Nazimuddin(나짐) Email:nazim@eslab.inha.ac.kr 1210 Hi-tech centre.
  • 2. Hardware Features Internal Hardware Processor Memory Register External hardware Keyboard Monitor Disk CD-ROM
  • 3. Bits and Bytes Bits The fundamental building block of computer storage is Bit. A bit may be Off  0 On  1
  • 4.
  • 5. Related Bytes Word 2-Byte(16-bit) Double Word 4-Byte(32-bit) Quadword 8-Byte(64-bit) Paragraph 16-byte(128) Kilobyte(KB) Megabyte(MB)
  • 6.
  • 7.
  • 8.
  • 9. Expand each hex digit to the equivalent 4-bit binary form
  • 10. You may omit leading zeros of leftmost digit
  • 11. 37h = 0011 0111b
  • 14. Group bits by fours (starting with least significant bits)
  • 15. Add leading zeros as necessary to complete the last group
  • 16. Convert each group to the equivalent hex digit
  • 17.
  • 18. Numeric Data Binary storage two’s complement, one’s complement, sign and magnitude, or biased representations ASCII storage sequence of ASCII bytes representing the digits of the number expressed in some radix Binary Coded Decimal sequence of nybbles representing digits 0-9 of the number
  • 19. Binary Storage A pre-arranged storage size is used typically byte, word, doubleword, or quadword Represent a number in base two and encode the bits 197d is 11000101b at least 8 bits will be required to store this number (leading zeros are added if necessary to fill additional bits for larger storage sizes)
  • 20.
  • 21. two’s complement code is most common
  • 22. only 7 bits are used for the magnitude
  • 23. Minimum -128 is coded as 10000000b
  • 24. Maximum +127 is coded as 01111111b
  • 27. all 8 bits used to represent the magnitude of the number
  • 28. Minimum 0 (zero) is coded as 00000000b
  • 29.
  • 31. Word
  • 36.
  • 38. Word
  • 43.
  • 44. Use the same algorithm you practiced in second grade!
  • 45. Binary Example: c ccc 10101 + 1111 100100 0+0 = 0 0+1 = 1 1+0 = 1 1+1 = 10 1+1+1 = 11
  • 46. Negative Binary Number A negative binary value is expressed in Two’s complement notation. Two’s complement Reverse the bit Add 1 Example: +65 Reverse bits Add 1 Number -65 01000001 10111110 1 10111111
  • 47. Subtraction How to Subtract 42 from 65 ? 65 : +(-43) : = 22
  • 48. PC Components System Board Processor, main memory, connectors, hard disk, etc… Bus A bus with wires attached to the system board connects the components. Processor 8088,8086,80286….Pentium Execution and Bus control unit
  • 49. Execution and Bus control Unit EU: Execution Unit BIU: Bus interface Unit Program control Instruction Queue . .
  • 50. Intel 8086 Organization Registers - storage locations found inside the processor for temporary storage of data Data Registers (16-bit) AX, BX, CX, DX Address Registers (16-bit) Segment registers: CS, SS, DS, ES Pointer registers: SP, BP, IP Index registers: SI, DI Status (Flags) register (16-bit)
  • 51. Data Registers The data registers may be used for general purposes, however each has special uses AX : Accumulator BX : Base CX : Count DX : Data Each byte of the 4 data registers can be accessed independently AH, AL, BH, etc. These are referred to as 8-bit registers, but remember they are part of an existing register
  • 52. Memory 8086 - 1 megabyte of memory (220 bytes) Each byte is accessed by specifying an address (00000h through FFFFFh) 20-bit addresses must be formed from 16-bits of information
  • 53. Interrupt Vectors BIOS and DOS Data DOS Application Program Area Video Reserved BIOS
  • 54. Segment Registers 20-bit addresses are obtained by combining two 16-bit registers, segment:offset Address = segment*16(10h)+offset Example CS: 010C IP: 14D2 Address = 010C*10+14D2 = 010C0+14D2 Address = 02592 Each segment is 64K, segments can start at any paragraph boundary
  • 55. Program Segments During program execution, the segment registers are only changed if memory not currently accessible in an active segment must be accessed Program bytes are arranged into distinct segments for convenience CS -> segment containing machine instructions SS -> segment containing storage for the stack DS -> segment containing data values and storage ES -> segment for additional data or special memory operations Programmers must be aware of this organization
  • 56. Instruction and Stack Pointers IP contains the address of the next instruction to be executed IP specifies an offset into the CS segment IP is not the operand of any instruction SP points to the top item on the stack SP is an offset into the SS segment SP can be used as an operand in some instructions
  • 57. BP and Index Registers BP is a Base Pointer Specifies an offset into any segment, but most commonly the Stack segment SI and DI are called Index registers They normally specify an offset into the Data segment, although they can be used as offsets into any segment Sometimes they hold a number to be added to the address of an array (index)
  • 58. Flags Individual bits are used to store the status of the microprocessor Bits are set or cleared as the result of many operations Bits may be affected indirectly (by the execution of an instruction) or directly by an instruction designed to access the status word.