SlideShare a Scribd company logo
Chapter 2
Data Manipulation
© 2007 Pearson Addison-Wesley.
All rights reserved
© 2007 Pearson Addison-Wesley. All
rights reserved 0-2
Chapter 2: Data Manipulation
• 2.1 Computer Architecture
• 2.2 Machine Language
• 2.3 Program Execution
© 2007 Pearson Addison-Wesley. All
rights reserved 0-3
Computer Architecture - Von Neumann architecture
• The von Neumann architecture is a
computer design model specifying
sequential architectures.
- Use a single storage structure to
hold both instructions and data.
- Run any arbitrary (but well-formed)
sequence of instructions;
- Have inputs and outputs;
© 2007 Pearson Addison-Wesley. All
rights reserved 0-4
Computer Architecture
• Central Processing Unit
(CPU) or processor
– Arithmetic/Logic unit
versus Control unit
– Registers
• General purpose (Data
registers, address
registers)
• Special purpose PC, IR
© 2007 Pearson Addison-Wesley. All
rights reserved 0-5
BUS
• Control lines These
allow the CPU to control
which operations the
devices attached should
perform, I.E. read or
write.
• Address lines
Allows the CPU to
reference certain
(Memory) locations
within the device.
• Data lines
The meaningful data
which is to be sent or
retrieved from a device is
placed on to these lines.
© 2007 Pearson Addison-Wesley. All
rights reserved 0-6
Figure 2.1 CPU and main
memory connected via a bus
© 2007 Pearson Addison-Wesley. All
rights reserved 0-7
Stored Program Concept & CPU
Operation
A program can be encoded
as bit patterns and stored in
main memory. From there,
the CPU can then extract the
instructions and execute
them. In turn, the program to
be executed can be altered
easily.
© 2007 Pearson Addison-Wesley. All
rights reserved 0-8
Terminology
• Machine instruction: An instruction (or
command) encoded as a bit pattern
recognizable by the CPU
• Machine language: The set of all instructions
recognized by a machine
© 2007 Pearson Addison-Wesley. All
rights reserved 0-9
Machine Language Philosophies
• Reduced Instruction Set Computing (RISC)
– Few, simple, efficient, and fast instructions
– Example: PowerPC from Apple/IBM/Motorola
• Complex Instruction Set Computing (CISC)
– Many, convenient, and powerful instructions
– Example: Pentium from Intel
© 2007 Pearson Addison-Wesley. All
rights reserved 0-10
Machine Instruction Types
• Data Transfer: copy data from one location to
another
• Arithmetic/Logic: use existing bit patterns to
compute a new bit patterns
• Control: direct the execution of the program
© 2007 Pearson Addison-Wesley. All
rights reserved 0-11
Figure 2.2 Adding values stored
in memory
© 2007 Pearson Addison-Wesley. All
rights reserved 0-12
Figure 2.3 Dividing values stored
in memory
© 2007 Pearson Addison-Wesley. All
rights reserved 0-13
Figure 2.4 The architecture of the
machine described in Appendix C
© 2007 Pearson Addison-Wesley. All
rights reserved 0-14
Parts of a Machine Instruction
• Op-code: Specifies which operation to execute
• Operand: Gives more detailed information
about the operation
– Interpretation of operand varies depending on op-
code
© 2007 Pearson Addison-Wesley. All
rights reserved 0-15
Figure 2.5 The composition of an
instruction for the machine in
Appendix C
© 2007 Pearson Addison-Wesley. All
rights reserved 0-16
Figure 2.6 Decoding the
instruction 35A7
© 2007 Pearson Addison-Wesley. All
rights reserved 0-17
Figure 2.7 An encoded version of
the instructions in Figure 2.2
© 2007 Pearson Addison-Wesley. All
rights reserved 0-18
Program Execution
• Controlled by two special-purpose registers
– Program counter: address of next instruction
– Instruction register: current instruction
• Machine Cycle
– Fetch
– Decode
– Execute
© 2007 Pearson Addison-Wesley. All
rights reserved 0-19
Figure 2.8 The machine cycle
© 2007 Pearson Addison-Wesley. All
rights reserved 0-20
Figure 2.9 Decoding the
instruction B258
© 2007 Pearson Addison-Wesley. All
rights reserved 0-21
Figure 2.10 The program from Figure
2.7 stored in main memory ready for
execution
© 2007 Pearson Addison-Wesley. All
rights reserved 0-22
Figure 2.11 Performing the fetch
step of the machine cycle
© 2007 Pearson Addison-Wesley. All
rights reserved 0-23
Figure 2.12 Rotating the bit
pattern A3 one bit to the right
© 2007 Pearson Addison-Wesley. All
rights reserved 0-24
Figure 2.11 Performing the fetch
step of the machine cycle (cont’d)
© 2007 Pearson Addison-Wesley. All
rights reserved 0-25
Review
• Concept of instruction
• Basics of computer architecture
- Von Newmann architecture model
- Roles of memory, CPU(control unit, ALU,
Registers), Bus, I/O
- Decoding of instructions
- Machine cycle (Control unit performs its job)
© 2007 Pearson Addison-Wesley. All
rights reserved 0-26
Review : Von Neumann architecture model

More Related Content

What's hot

Design a processor
Design a processorDesign a processor
Design a processor
Farzana Aktar
 
Computer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answersComputer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answers
appasami
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
RahulRathi94
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектур
Muuluu
 
Chapter 1 basic structure of computers
Chapter 1  basic structure of computersChapter 1  basic structure of computers
Chapter 1 basic structure of computers
Gurpreet Singh
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
MrsNunn
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
Jubayer Alam Shoikat
 
Lecture 34
Lecture 34Lecture 34
Lecture 34
RahulRathi94
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Sanjivani Sontakke
 
Basic computer organisation
Basic computer organisationBasic computer organisation
Basic computer organisation
vito_carleone
 
Processor architecture
Processor architectureProcessor architecture
Processor architecture
Muuluu
 
Lecture 28
Lecture 28Lecture 28
Lecture 28
RahulRathi94
 
Computer System Architecture Lecture Note 1: introduction
Computer System Architecture Lecture Note 1: introductionComputer System Architecture Lecture Note 1: introduction
Computer System Architecture Lecture Note 1: introduction
Budditha Hettige
 
Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]
Rafiq Azad
 
Cpu
CpuCpu
Module1
Module1Module1
Module1
dilshad begum
 
CPU Arcthitecture
CPU ArcthitectureCPU Arcthitecture
CPU Arcthitecture
akppal
 
Presentation on CPU
Presentation on CPUPresentation on CPU
Presentation on CPU
logicgate
 
Introduction to Computer Architecture
Introduction to Computer ArchitectureIntroduction to Computer Architecture
Introduction to Computer Architecture
Ankush Srivastava
 

What's hot (19)

Design a processor
Design a processorDesign a processor
Design a processor
 
Computer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answersComputer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answers
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектур
 
Chapter 1 basic structure of computers
Chapter 1  basic structure of computersChapter 1  basic structure of computers
Chapter 1 basic structure of computers
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
 
Lecture 34
Lecture 34Lecture 34
Lecture 34
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Basic computer organisation
Basic computer organisationBasic computer organisation
Basic computer organisation
 
Processor architecture
Processor architectureProcessor architecture
Processor architecture
 
Lecture 28
Lecture 28Lecture 28
Lecture 28
 
Computer System Architecture Lecture Note 1: introduction
Computer System Architecture Lecture Note 1: introductionComputer System Architecture Lecture Note 1: introduction
Computer System Architecture Lecture Note 1: introduction
 
Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]
 
Cpu
CpuCpu
Cpu
 
Module1
Module1Module1
Module1
 
CPU Arcthitecture
CPU ArcthitectureCPU Arcthitecture
CPU Arcthitecture
 
Presentation on CPU
Presentation on CPUPresentation on CPU
Presentation on CPU
 
Introduction to Computer Architecture
Introduction to Computer ArchitectureIntroduction to Computer Architecture
Introduction to Computer Architecture
 

Viewers also liked

It News
It News It News
It News
Kasinee N Nan
 
Cultural enviroment
Cultural enviromentCultural enviroment
Cultural enviroment
-
 
Project vlm (al halal meat factory)
Project vlm (al halal meat factory)Project vlm (al halal meat factory)
Project vlm (al halal meat factory)
-
 
HVG megjelenés
HVG megjelenésHVG megjelenés
HVG megjelenésFanni Pan
 
[Re-Tech Exhibitor] SHINSUN
[Re-Tech Exhibitor] SHINSUN[Re-Tech Exhibitor] SHINSUN
[Re-Tech Exhibitor] SHINSUN
Re-Tech
 
Cs ch04
Cs ch04Cs ch04
Cs ch04
-
 
The Benefits of Genetically Modified Food Crops
The Benefits of Genetically Modified Food CropsThe Benefits of Genetically Modified Food Crops
The Benefits of Genetically Modified Food Crops
enviro03q
 
Презентация "Мировой"
Презентация  "Мировой"Презентация  "Мировой"
Презентация "Мировой"
Ivan Deinichenko
 
Planning presentation
Planning presentationPlanning presentation
Planning presentation
-
 
Cs ch06
Cs ch06Cs ch06
Cs ch06
-
 
Cs ch03
Cs ch03Cs ch03
Cs ch03
-
 
Cs ch01
Cs ch01Cs ch01
Cs ch01
-
 
Core concept of marketing
Core concept of marketingCore concept of marketing
Core concept of marketing
United International University
 
Quantitative approach
Quantitative approachQuantitative approach
Quantitative approach
-
 

Viewers also liked (14)

It News
It News It News
It News
 
Cultural enviroment
Cultural enviromentCultural enviroment
Cultural enviroment
 
Project vlm (al halal meat factory)
Project vlm (al halal meat factory)Project vlm (al halal meat factory)
Project vlm (al halal meat factory)
 
HVG megjelenés
HVG megjelenésHVG megjelenés
HVG megjelenés
 
[Re-Tech Exhibitor] SHINSUN
[Re-Tech Exhibitor] SHINSUN[Re-Tech Exhibitor] SHINSUN
[Re-Tech Exhibitor] SHINSUN
 
Cs ch04
Cs ch04Cs ch04
Cs ch04
 
The Benefits of Genetically Modified Food Crops
The Benefits of Genetically Modified Food CropsThe Benefits of Genetically Modified Food Crops
The Benefits of Genetically Modified Food Crops
 
Презентация "Мировой"
Презентация  "Мировой"Презентация  "Мировой"
Презентация "Мировой"
 
Planning presentation
Planning presentationPlanning presentation
Planning presentation
 
Cs ch06
Cs ch06Cs ch06
Cs ch06
 
Cs ch03
Cs ch03Cs ch03
Cs ch03
 
Cs ch01
Cs ch01Cs ch01
Cs ch01
 
Core concept of marketing
Core concept of marketingCore concept of marketing
Core concept of marketing
 
Quantitative approach
Quantitative approachQuantitative approach
Quantitative approach
 

Similar to Cs ch02

Data manipulation chapter 2 from the Glenn Brookshare
Data manipulation chapter 2 from the Glenn BrookshareData manipulation chapter 2 from the Glenn Brookshare
Data manipulation chapter 2 from the Glenn Brookshare
Kashif Ali
 
Chap02 data manipulation
Chap02   data manipulationChap02   data manipulation
Chap02 data manipulation
Zohair Pia
 
17 demonstration server client system-v1.00_en
17 demonstration server client system-v1.00_en17 demonstration server client system-v1.00_en
17 demonstration server client system-v1.00_en
confidencial
 
19EICN
19EICN19EICN
ERTS_Unit 1_PPT.pdf
ERTS_Unit 1_PPT.pdfERTS_Unit 1_PPT.pdf
ERTS_Unit 1_PPT.pdf
VinothkumarUruman1
 
E scala design platform
E scala design platformE scala design platform
E scala design platform
esenciatech
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
Suvendu Kumar Dash
 
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdfUnit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
IronMan665214
 
directCell - Cell/B.E. tightly coupled via PCI Express
directCell - Cell/B.E. tightly coupled via PCI ExpressdirectCell - Cell/B.E. tightly coupled via PCI Express
directCell - Cell/B.E. tightly coupled via PCI Express
Heiko Joerg Schick
 
UNIT-III ES.ppt
UNIT-III ES.pptUNIT-III ES.ppt
UNIT-III ES.ppt
DustinGraham19
 
Uni Processor Architecture
Uni Processor ArchitectureUni Processor Architecture
Uni Processor Architecture
Ashish KC
 
Ch05
Ch05Ch05
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded SystemImplementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
insydesoftware
 
Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdf
armcomputers
 
Unified Computing System - PC Without CPU
Unified Computing System - PC Without CPUUnified Computing System - PC Without CPU
Unified Computing System - PC Without CPU
ErAnalSalshingikar
 
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
Hyemin Hwang
 
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
DrMThillaiRaniAsstPr
 
The Basics of Cell Computing Technology
The Basics of Cell Computing TechnologyThe Basics of Cell Computing Technology
The Basics of Cell Computing Technology
Slide_N
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
AbdulRehman703897
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
Yousaf Alam
 

Similar to Cs ch02 (20)

Data manipulation chapter 2 from the Glenn Brookshare
Data manipulation chapter 2 from the Glenn BrookshareData manipulation chapter 2 from the Glenn Brookshare
Data manipulation chapter 2 from the Glenn Brookshare
 
Chap02 data manipulation
Chap02   data manipulationChap02   data manipulation
Chap02 data manipulation
 
17 demonstration server client system-v1.00_en
17 demonstration server client system-v1.00_en17 demonstration server client system-v1.00_en
17 demonstration server client system-v1.00_en
 
19EICN
19EICN19EICN
19EICN
 
ERTS_Unit 1_PPT.pdf
ERTS_Unit 1_PPT.pdfERTS_Unit 1_PPT.pdf
ERTS_Unit 1_PPT.pdf
 
E scala design platform
E scala design platformE scala design platform
E scala design platform
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdfUnit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
Unit1_Basic_Structure_of_Computer-7-11-2022-11am.ppt.pdf
 
directCell - Cell/B.E. tightly coupled via PCI Express
directCell - Cell/B.E. tightly coupled via PCI ExpressdirectCell - Cell/B.E. tightly coupled via PCI Express
directCell - Cell/B.E. tightly coupled via PCI Express
 
UNIT-III ES.ppt
UNIT-III ES.pptUNIT-III ES.ppt
UNIT-III ES.ppt
 
Uni Processor Architecture
Uni Processor ArchitectureUni Processor Architecture
Uni Processor Architecture
 
Ch05
Ch05Ch05
Ch05
 
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded SystemImplementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
 
Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdf
 
Unified Computing System - PC Without CPU
Unified Computing System - PC Without CPUUnified Computing System - PC Without CPU
Unified Computing System - PC Without CPU
 
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
HMI Replacement_GE MARK V, ABB Procontrol 13, MHI MIDAS 8000, SIEMEN TXP
 
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
2.1 Computing Platforms - 2.1.1 & 2.1.2.pptx
 
The Basics of Cell Computing Technology
The Basics of Cell Computing TechnologyThe Basics of Cell Computing Technology
The Basics of Cell Computing Technology
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 

More from -

Introduction to computer (shaheen)
Introduction to computer (shaheen)Introduction to computer (shaheen)
Introduction to computer (shaheen)
-
 
Introduction to computer (boys scout)
Introduction to computer (boys scout)Introduction to computer (boys scout)
Introduction to computer (boys scout)
-
 
Hci with emotional intelligence
Hci with emotional intelligenceHci with emotional intelligence
Hci with emotional intelligence
-
 
Surf smart
Surf smartSurf smart
Surf smart
-
 
Cs ch08
Cs ch08Cs ch08
Cs ch08
-
 
Cs ch00
Cs ch00Cs ch00
Cs ch00
-
 

More from - (6)

Introduction to computer (shaheen)
Introduction to computer (shaheen)Introduction to computer (shaheen)
Introduction to computer (shaheen)
 
Introduction to computer (boys scout)
Introduction to computer (boys scout)Introduction to computer (boys scout)
Introduction to computer (boys scout)
 
Hci with emotional intelligence
Hci with emotional intelligenceHci with emotional intelligence
Hci with emotional intelligence
 
Surf smart
Surf smartSurf smart
Surf smart
 
Cs ch08
Cs ch08Cs ch08
Cs ch08
 
Cs ch00
Cs ch00Cs ch00
Cs ch00
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Cs ch02

  • 1. Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved
  • 2. © 2007 Pearson Addison-Wesley. All rights reserved 0-2 Chapter 2: Data Manipulation • 2.1 Computer Architecture • 2.2 Machine Language • 2.3 Program Execution
  • 3. © 2007 Pearson Addison-Wesley. All rights reserved 0-3 Computer Architecture - Von Neumann architecture • The von Neumann architecture is a computer design model specifying sequential architectures. - Use a single storage structure to hold both instructions and data. - Run any arbitrary (but well-formed) sequence of instructions; - Have inputs and outputs;
  • 4. © 2007 Pearson Addison-Wesley. All rights reserved 0-4 Computer Architecture • Central Processing Unit (CPU) or processor – Arithmetic/Logic unit versus Control unit – Registers • General purpose (Data registers, address registers) • Special purpose PC, IR
  • 5. © 2007 Pearson Addison-Wesley. All rights reserved 0-5 BUS • Control lines These allow the CPU to control which operations the devices attached should perform, I.E. read or write. • Address lines Allows the CPU to reference certain (Memory) locations within the device. • Data lines The meaningful data which is to be sent or retrieved from a device is placed on to these lines.
  • 6. © 2007 Pearson Addison-Wesley. All rights reserved 0-6 Figure 2.1 CPU and main memory connected via a bus
  • 7. © 2007 Pearson Addison-Wesley. All rights reserved 0-7 Stored Program Concept & CPU Operation A program can be encoded as bit patterns and stored in main memory. From there, the CPU can then extract the instructions and execute them. In turn, the program to be executed can be altered easily.
  • 8. © 2007 Pearson Addison-Wesley. All rights reserved 0-8 Terminology • Machine instruction: An instruction (or command) encoded as a bit pattern recognizable by the CPU • Machine language: The set of all instructions recognized by a machine
  • 9. © 2007 Pearson Addison-Wesley. All rights reserved 0-9 Machine Language Philosophies • Reduced Instruction Set Computing (RISC) – Few, simple, efficient, and fast instructions – Example: PowerPC from Apple/IBM/Motorola • Complex Instruction Set Computing (CISC) – Many, convenient, and powerful instructions – Example: Pentium from Intel
  • 10. © 2007 Pearson Addison-Wesley. All rights reserved 0-10 Machine Instruction Types • Data Transfer: copy data from one location to another • Arithmetic/Logic: use existing bit patterns to compute a new bit patterns • Control: direct the execution of the program
  • 11. © 2007 Pearson Addison-Wesley. All rights reserved 0-11 Figure 2.2 Adding values stored in memory
  • 12. © 2007 Pearson Addison-Wesley. All rights reserved 0-12 Figure 2.3 Dividing values stored in memory
  • 13. © 2007 Pearson Addison-Wesley. All rights reserved 0-13 Figure 2.4 The architecture of the machine described in Appendix C
  • 14. © 2007 Pearson Addison-Wesley. All rights reserved 0-14 Parts of a Machine Instruction • Op-code: Specifies which operation to execute • Operand: Gives more detailed information about the operation – Interpretation of operand varies depending on op- code
  • 15. © 2007 Pearson Addison-Wesley. All rights reserved 0-15 Figure 2.5 The composition of an instruction for the machine in Appendix C
  • 16. © 2007 Pearson Addison-Wesley. All rights reserved 0-16 Figure 2.6 Decoding the instruction 35A7
  • 17. © 2007 Pearson Addison-Wesley. All rights reserved 0-17 Figure 2.7 An encoded version of the instructions in Figure 2.2
  • 18. © 2007 Pearson Addison-Wesley. All rights reserved 0-18 Program Execution • Controlled by two special-purpose registers – Program counter: address of next instruction – Instruction register: current instruction • Machine Cycle – Fetch – Decode – Execute
  • 19. © 2007 Pearson Addison-Wesley. All rights reserved 0-19 Figure 2.8 The machine cycle
  • 20. © 2007 Pearson Addison-Wesley. All rights reserved 0-20 Figure 2.9 Decoding the instruction B258
  • 21. © 2007 Pearson Addison-Wesley. All rights reserved 0-21 Figure 2.10 The program from Figure 2.7 stored in main memory ready for execution
  • 22. © 2007 Pearson Addison-Wesley. All rights reserved 0-22 Figure 2.11 Performing the fetch step of the machine cycle
  • 23. © 2007 Pearson Addison-Wesley. All rights reserved 0-23 Figure 2.12 Rotating the bit pattern A3 one bit to the right
  • 24. © 2007 Pearson Addison-Wesley. All rights reserved 0-24 Figure 2.11 Performing the fetch step of the machine cycle (cont’d)
  • 25. © 2007 Pearson Addison-Wesley. All rights reserved 0-25 Review • Concept of instruction • Basics of computer architecture - Von Newmann architecture model - Roles of memory, CPU(control unit, ALU, Registers), Bus, I/O - Decoding of instructions - Machine cycle (Control unit performs its job)
  • 26. © 2007 Pearson Addison-Wesley. All rights reserved 0-26 Review : Von Neumann architecture model

Editor's Notes

  1. Pictures on data Manipulation
  2. Good