SlideShare a Scribd company logo
P3-Represent
data flow
around the
computer
By George Smith-Moore
Block diagram of the
computer system.
Processing

Input

Output

Input
devices:

Output
devices:

It is used to insert
data into a
computational
device

Mouse
Keyboard
Joystick
Controller

It is used to retrieve
information from a
computational
device

CPU
Output

Input
Memory

Monitor
Projector
Speakers
CPU

MEMORY

INPUT AND
OUTPUT

It is used by the CPU to communicate with other devices

Address BUS

It is used to specify a physical address for the CPU

Data BUS

It allows the transfer of data between two components on the motherboard, or between two
computers.

System BUS

Control BUS
The Northbridge connects
with the faster I/O’s such as
the RAM and the AGP, the
Northbridge is bigger looking
than the Southbridge, the
Southbridge connects with
the slower I/O’s such as the
USB and the BIOS.

AGP

The Northbridge
and Southbridge
refer to the chipsets.

CPU
F
S
B

RAM

North Bridge

(GPU)

Legacy
PCI(e)
BIOS

South Bridge

USB
ISA

(Industry standard
architecture)

IDE

(integrated drive
electronics)

More Related Content

What's hot

How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1lukecisco1
 
Introduction to Motherboard
Introduction to Motherboard Introduction to Motherboard
Introduction to Motherboard
Makrand Patil
 
COMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTSCOMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTS
SHIVALI NEGI
 
introduction to computer hardware
 introduction to computer hardware introduction to computer hardware
introduction to computer hardwareBikramjeet Sidhu
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
mite6025.hku
 
PC Hardware Overview
PC Hardware OverviewPC Hardware Overview
PC Hardware Overview
Prabu U
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing HardwarePatty Ramsey
 
CPU-Central Processing Unit (With History and Complete Detail)
CPU-Central Processing Unit (With History and Complete Detail)CPU-Central Processing Unit (With History and Complete Detail)
CPU-Central Processing Unit (With History and Complete Detail)
Adeel Rasheed
 
Introduction of cpu
Introduction of cpuIntroduction of cpu
Introduction of cpu
Tharindu Darshana
 
IO Techniques in Computer Organization
IO Techniques in Computer OrganizationIO Techniques in Computer Organization
IO Techniques in Computer Organization
Om Prakash
 
Computer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawarComputer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawar
King Parmeshwar Pawar :) Edu.Li
 
Computer Components
Computer ComponentsComputer Components
Computer Components
dheelan2995
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemMark Santos
 
Central Processing Unit(CPU)
Central Processing Unit(CPU)Central Processing Unit(CPU)
Central Processing Unit(CPU)
ANSANS8
 
Fonctionnement d’un système d’exploitation
Fonctionnement d’un système d’exploitationFonctionnement d’un système d’exploitation
Fonctionnement d’un système d’exploitation
Imane Bellali
 

What's hot (20)

How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1
 
Introduction to Motherboard
Introduction to Motherboard Introduction to Motherboard
Introduction to Motherboard
 
COMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTSCOMPUTER SYSTEM AND ITS COMPONENTS
COMPUTER SYSTEM AND ITS COMPONENTS
 
introduction to computer hardware
 introduction to computer hardware introduction to computer hardware
introduction to computer hardware
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
PC Hardware Overview
PC Hardware OverviewPC Hardware Overview
PC Hardware Overview
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing Hardware
 
CPU-Central Processing Unit (With History and Complete Detail)
CPU-Central Processing Unit (With History and Complete Detail)CPU-Central Processing Unit (With History and Complete Detail)
CPU-Central Processing Unit (With History and Complete Detail)
 
Introduction of cpu
Introduction of cpuIntroduction of cpu
Introduction of cpu
 
BIOS/UEFI
BIOS/UEFIBIOS/UEFI
BIOS/UEFI
 
IO Techniques in Computer Organization
IO Techniques in Computer OrganizationIO Techniques in Computer Organization
IO Techniques in Computer Organization
 
Disco duro.pdf
Disco duro.pdfDisco duro.pdf
Disco duro.pdf
 
Computer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawarComputer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawar
 
Computer Components
Computer ComponentsComputer Components
Computer Components
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Processors
ProcessorsProcessors
Processors
 
Central Processing Unit(CPU)
Central Processing Unit(CPU)Central Processing Unit(CPU)
Central Processing Unit(CPU)
 
Computer
Computer Computer
Computer
 
Fonctionnement d’un système d’exploitation
Fonctionnement d’un système d’exploitationFonctionnement d’un système d’exploitation
Fonctionnement d’un système d’exploitation
 
CPU
CPUCPU
CPU
 

Similar to Data flow in a computer

P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
Ajay Jassi
 
Computer Parts & Functions.pdf
Computer Parts & Functions.pdfComputer Parts & Functions.pdf
Computer Parts & Functions.pdf
PatrickSerrano10
 
2nd puc computer science chapter 1 backdrop of computers
2nd puc computer science chapter 1  backdrop of computers 2nd puc computer science chapter 1  backdrop of computers
2nd puc computer science chapter 1 backdrop of computers
Aahwini Esware gowda
 
computerhardware-160717095805.pptx
computerhardware-160717095805.pptxcomputerhardware-160717095805.pptx
computerhardware-160717095805.pptx
AldrinJosephLacuarin
 
Typical configuration of computer chapter 1
Typical configuration of computer chapter 1 Typical configuration of computer chapter 1
Typical configuration of computer chapter 1
Gopi Nath
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
DR Arveen kumar
 
Typical Configuration of Computer System
Typical Configuration of Computer SystemTypical Configuration of Computer System
Typical Configuration of Computer System
Prof. Dr. K. Adisesha
 
typical-configuration-of-computer.pdf
typical-configuration-of-computer.pdftypical-configuration-of-computer.pdf
typical-configuration-of-computer.pdf
Prof. Dr. K. Adisesha
 
Identification of parts of motherboard
Identification of parts of motherboardIdentification of parts of motherboard
Identification of parts of motherboard
AbhayaRajbanshi
 
motherboard
motherboardmotherboard
motherboard
iyinyan
 
computerhardware-160717095805.pptx
computerhardware-160717095805.pptxcomputerhardware-160717095805.pptx
computerhardware-160717095805.pptx
RiyanElaine
 
Lesson three hardware basics
Lesson three hardware basicsLesson three hardware basics
Lesson three hardware basicsMik Endale
 
computerhardwarE.pdf
computerhardwarE.pdfcomputerhardwarE.pdf
computerhardwarE.pdf
AFANJIPHILL
 
Computer Hardware: Parts & Functions
Computer Hardware: Parts & FunctionsComputer Hardware: Parts & Functions
Computer Hardware: Parts & Functions
Ray Monterola
 
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptxitworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
karthiknarra1906
 
Computer-System-pratibha.pdf
Computer-System-pratibha.pdfComputer-System-pratibha.pdf
Computer-System-pratibha.pdf
Pratibha Sagar
 
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptxWHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
ssuserfbb80b
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1Rajan Das
 
Mother board
Mother boardMother board
Mother board
Sripati Mahapatra
 
Inside the computer
Inside the computerInside the computer
Inside the computer
Zafar Ayub
 

Similar to Data flow in a computer (20)

P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 
Computer Parts & Functions.pdf
Computer Parts & Functions.pdfComputer Parts & Functions.pdf
Computer Parts & Functions.pdf
 
2nd puc computer science chapter 1 backdrop of computers
2nd puc computer science chapter 1  backdrop of computers 2nd puc computer science chapter 1  backdrop of computers
2nd puc computer science chapter 1 backdrop of computers
 
computerhardware-160717095805.pptx
computerhardware-160717095805.pptxcomputerhardware-160717095805.pptx
computerhardware-160717095805.pptx
 
Typical configuration of computer chapter 1
Typical configuration of computer chapter 1 Typical configuration of computer chapter 1
Typical configuration of computer chapter 1
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Typical Configuration of Computer System
Typical Configuration of Computer SystemTypical Configuration of Computer System
Typical Configuration of Computer System
 
typical-configuration-of-computer.pdf
typical-configuration-of-computer.pdftypical-configuration-of-computer.pdf
typical-configuration-of-computer.pdf
 
Identification of parts of motherboard
Identification of parts of motherboardIdentification of parts of motherboard
Identification of parts of motherboard
 
motherboard
motherboardmotherboard
motherboard
 
computerhardware-160717095805.pptx
computerhardware-160717095805.pptxcomputerhardware-160717095805.pptx
computerhardware-160717095805.pptx
 
Lesson three hardware basics
Lesson three hardware basicsLesson three hardware basics
Lesson three hardware basics
 
computerhardwarE.pdf
computerhardwarE.pdfcomputerhardwarE.pdf
computerhardwarE.pdf
 
Computer Hardware: Parts & Functions
Computer Hardware: Parts & FunctionsComputer Hardware: Parts & Functions
Computer Hardware: Parts & Functions
 
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptxitworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
itworkshhjjsjsjsjjsjsjajjajajajjsjsjahop (2).pptx
 
Computer-System-pratibha.pdf
Computer-System-pratibha.pdfComputer-System-pratibha.pdf
Computer-System-pratibha.pdf
 
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptxWHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
WHAT-ARE-THE-DIFFERENT-HARDWARE-COMPONENT-OF-COMPUTER.pptx
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1
 
Mother board
Mother boardMother board
Mother board
 
Inside the computer
Inside the computerInside the computer
Inside the computer
 

More from OriginalGSM

UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
OriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
OriginalGSM
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 

More from OriginalGSM (20)

UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Security plan
Security planSecurity plan
Security plan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Data flow in a computer

  • 2. Block diagram of the computer system. Processing Input Output Input devices: Output devices: It is used to insert data into a computational device Mouse Keyboard Joystick Controller It is used to retrieve information from a computational device CPU Output Input Memory Monitor Projector Speakers
  • 3. CPU MEMORY INPUT AND OUTPUT It is used by the CPU to communicate with other devices Address BUS It is used to specify a physical address for the CPU Data BUS It allows the transfer of data between two components on the motherboard, or between two computers. System BUS Control BUS
  • 4. The Northbridge connects with the faster I/O’s such as the RAM and the AGP, the Northbridge is bigger looking than the Southbridge, the Southbridge connects with the slower I/O’s such as the USB and the BIOS. AGP The Northbridge and Southbridge refer to the chipsets. CPU F S B RAM North Bridge (GPU) Legacy PCI(e) BIOS South Bridge USB ISA (Industry standard architecture) IDE (integrated drive electronics)