SlideShare a Scribd company logo
Data transfer and
manipulation
By
k.Sivapriya
I.msc(IT)
Items
• Definition
• Data transfer instruction
• Data manipulation
Arithmetic instruction
Logical and bit manipulation instruction
Shift instruction
• Program control instruction
Data transfer and manipulation
Computer provides an extensive set of
instruction to give the user flexibility to carry
out various computational task.
The instruction set of different computer differ
from each other mostly in the way the
operands are determined from address and
mode field.
The actual operation available in the istruction
from one computer to another.
Cont…
Computer instruction can be classified into three
categories:-
• Data transfer instruction
• Data manipulation instruction
• Program control
Data transfer instruction cause transfer of data
from one location to another with out changing
the binary information content.
Cont…
Data manipulation instruction are those perform
arithmetic, logical and shift operation. The
program taken control instruction provide
decision making capability and changes to
taken by program when executed in the
computer.
Data transfer instruction
• Data transfer instruction move data from one
place in the computer to another with out
changing the data contents.
• The most common transfer are between
memory and processer register between
processer register and input or output and
between processer register themselves.
Cont…
NAME MNEMONIC
Load LD
Store ST
Move MOV
Exchange XCH
Input IN
Output OUT
Push PUSH
Pop POP
Data manipulation instruction
Data manipulation instruction perform operation
on data and provide the computational
capabilities for computer.
There are three basic types
• Arithmetic instruction
• Logical ad bit manipulation instruction
• Shift instruction
Arithmetic instruction
• The basic arithmetic operation are addition,
subtraction, multiplication and division.
• Most computer provide instruction for all four
operation.
• Some small computer have only addition and
possibly subtraction instruction the
multiplication and division must then be
generated by means of software subroutine.
Logical and bit manipulation
instruction
• Logical instruction perform binary operation
on strings of bits stored in register. They are
useful for manipulation individual bits or
group of bits that represent binary coded
information.
• The AND, OR and XOR instruction produce
the corresponding logical operation on
individual bits of the operands. Although they
performed the Boolean operations.
Shift instruction
• Instruction to shift the contents of an operand are
quite useful and are often provide in several
variations.
• Shift are operations in which the bit of a word are
moved to the left or right.
• The bit shifted in at the end of the word
determines the type of the shift used.
• Shift instruction may specify either logical shift ,
arithmetic shift or rotate type operation. In either
case the shift to be the right or to the left
Program control
• Instruction are always stored in successive
memory location.
• When processed in the CPU the instruction are
fetched from consecutive memory location
executed.
• Each time an instruction is fetched from
memory. The program counter is incremented
so that it contains the address of the next
instruction in sequences.
Cont…
Name Mnemonic
Branch BR
Jump JMP
Skip SKP
Call CALL
Return RET

More Related Content

What's hot

Instruction codes
Instruction codesInstruction codes
Instruction codes
pradeepa velmurugan
 
Instruction format
Instruction formatInstruction format
Instruction format
Sanjeev Patel
 
Direct Memory Access ppt
Direct Memory Access pptDirect Memory Access ppt
Microprogram Control
Microprogram Control Microprogram Control
Microprogram Control
Anuj Modi
 
Unit 4 sp macro
Unit 4 sp macroUnit 4 sp macro
Unit 4 sp macro
Deepmala Sharma
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptx
ArunaDevi63
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
Ibrahimcommunication Al Ani
 
Computer architecture control unit
Computer architecture control unitComputer architecture control unit
Computer architecture control unit
Mazin Alwaaly
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
Mazin Alwaaly
 
Input output organization
Input output organizationInput output organization
Input output organization
abdulugc
 
Interrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.kInterrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.k
Vijay Kumar
 
Control Unit Design
Control Unit DesignControl Unit Design
Control Unit Design
Vinit Raut
 
Timing and control circuit
Timing and control circuitTiming and control circuit
Timing and control circuit
Rajan Shah
 
Lecture 3 instruction set
Lecture 3  instruction setLecture 3  instruction set
Lecture 3 instruction set
Pradeep Kumar TS
 
Program control instructions
Program control instructionsProgram control instructions
Program control instructions
Dr. Girish GS
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
karthiga selvaraju
 
Floating point arithmetic
Floating point arithmeticFloating point arithmetic
Floating point arithmetic
vishal choudhary
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
Roshan kumar sahu
 
Introduction to loaders
Introduction to loadersIntroduction to loaders
Introduction to loaders
Tech_MX
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
Mazin Alwaaly
 

What's hot (20)

Instruction codes
Instruction codesInstruction codes
Instruction codes
 
Instruction format
Instruction formatInstruction format
Instruction format
 
Direct Memory Access ppt
Direct Memory Access pptDirect Memory Access ppt
Direct Memory Access ppt
 
Microprogram Control
Microprogram Control Microprogram Control
Microprogram Control
 
Unit 4 sp macro
Unit 4 sp macroUnit 4 sp macro
Unit 4 sp macro
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptx
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Computer architecture control unit
Computer architecture control unitComputer architecture control unit
Computer architecture control unit
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
 
Input output organization
Input output organizationInput output organization
Input output organization
 
Interrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.kInterrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.k
 
Control Unit Design
Control Unit DesignControl Unit Design
Control Unit Design
 
Timing and control circuit
Timing and control circuitTiming and control circuit
Timing and control circuit
 
Lecture 3 instruction set
Lecture 3  instruction setLecture 3  instruction set
Lecture 3 instruction set
 
Program control instructions
Program control instructionsProgram control instructions
Program control instructions
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
Floating point arithmetic
Floating point arithmeticFloating point arithmetic
Floating point arithmetic
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
 
Introduction to loaders
Introduction to loadersIntroduction to loaders
Introduction to loaders
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
 

Similar to Data transfer and manipulation

Data transfer and manipulation
Data transfer and  manipulationData transfer and  manipulation
Data transfer and manipulation
PreethaPreetha5
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
V.V.Vanniaperumal College for Women
 
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDESCOMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
ShahidSultan24
 
computer architecture
computer architecturecomputer architecture
computer architecture
Pandiya Rajan
 
Chapter 7
Chapter 7Chapter 7
Intel x86 and ARM Data types
Intel x86 and ARM Data typesIntel x86 and ARM Data types
Intel x86 and ARM Data types
Rowena Cornejo
 
Introduction to the instruction set of architecture
Introduction to the instruction set of architectureIntroduction to the instruction set of architecture
Introduction to the instruction set of architecture
1955ThoratChaitanyaB
 
Types of the operations in operating system
Types of the operations in operating systemTypes of the operations in operating system
Types of the operations in operating system
1955ThoratChaitanyaB
 
Control unit design
Control unit designControl unit design
Control unit design
Dhaval Bagal
 
Bca examination 2016 csa
Bca examination 2016 csaBca examination 2016 csa
Bca examination 2016 csa
Anjaan Gajendra
 
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdfComputer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
gadisaAdamu
 
Running a Program.pdf
Running a Program.pdfRunning a Program.pdf
Running a Program.pdf
RodelJoeSmith1
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
Dhaval Bagal
 
Computer_Organization and architecture _unit 1.pptx
Computer_Organization and architecture _unit 1.pptxComputer_Organization and architecture _unit 1.pptx
Computer_Organization and architecture _unit 1.pptx
ManimegalaM3
 
Computer Architecture Lecture slide 2. course se 222
Computer Architecture Lecture  slide 2. course se 222Computer Architecture Lecture  slide 2. course se 222
Computer Architecture Lecture slide 2. course se 222
tabeh82816
 
DG M 4 ppt.pptx
DG M 4 ppt.pptxDG M 4 ppt.pptx
DG M 4 ppt.pptx
Jumana74
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
janani thirupathi
 
Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522
kirupasuchi1996
 
SUDHARSAN.V.pptx
SUDHARSAN.V.pptxSUDHARSAN.V.pptx
SUDHARSAN.V.pptx
MalligaarjunanN
 
Computer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organizationComputer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organization
AmrutaMehata
 

Similar to Data transfer and manipulation (20)

Data transfer and manipulation
Data transfer and  manipulationData transfer and  manipulation
Data transfer and manipulation
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
 
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDESCOMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
COMPUTER SYSTEM ARCHITECTURE UNIT 3 FULL SLIDES
 
computer architecture
computer architecturecomputer architecture
computer architecture
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Intel x86 and ARM Data types
Intel x86 and ARM Data typesIntel x86 and ARM Data types
Intel x86 and ARM Data types
 
Introduction to the instruction set of architecture
Introduction to the instruction set of architectureIntroduction to the instruction set of architecture
Introduction to the instruction set of architecture
 
Types of the operations in operating system
Types of the operations in operating systemTypes of the operations in operating system
Types of the operations in operating system
 
Control unit design
Control unit designControl unit design
Control unit design
 
Bca examination 2016 csa
Bca examination 2016 csaBca examination 2016 csa
Bca examination 2016 csa
 
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdfComputer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
 
Running a Program.pdf
Running a Program.pdfRunning a Program.pdf
Running a Program.pdf
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
 
Computer_Organization and architecture _unit 1.pptx
Computer_Organization and architecture _unit 1.pptxComputer_Organization and architecture _unit 1.pptx
Computer_Organization and architecture _unit 1.pptx
 
Computer Architecture Lecture slide 2. course se 222
Computer Architecture Lecture  slide 2. course se 222Computer Architecture Lecture  slide 2. course se 222
Computer Architecture Lecture slide 2. course se 222
 
DG M 4 ppt.pptx
DG M 4 ppt.pptxDG M 4 ppt.pptx
DG M 4 ppt.pptx
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522
 
SUDHARSAN.V.pptx
SUDHARSAN.V.pptxSUDHARSAN.V.pptx
SUDHARSAN.V.pptx
 
Computer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organizationComputer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organization
 

More from rajshreemuthiah

oracle
oracleoracle
quality
qualityquality
bigdata
bigdatabigdata
polymorphism
polymorphismpolymorphism
polymorphism
rajshreemuthiah
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
rajshreemuthiah
 
interface
interfaceinterface
interface
rajshreemuthiah
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
rajshreemuthiah
 
concurrency control
concurrency controlconcurrency control
concurrency control
rajshreemuthiah
 
Education
EducationEducation
Education
rajshreemuthiah
 
Formal verification
Formal verificationFormal verification
Formal verification
rajshreemuthiah
 
Transaction management
Transaction management Transaction management
Transaction management
rajshreemuthiah
 
Multi thread
Multi threadMulti thread
Multi thread
rajshreemuthiah
 
System testing
System testingSystem testing
System testing
rajshreemuthiah
 
software maintenance
software maintenancesoftware maintenance
software maintenance
rajshreemuthiah
 
exception handling
exception handlingexception handling
exception handling
rajshreemuthiah
 
e governance
e governancee governance
e governance
rajshreemuthiah
 
recovery management
recovery managementrecovery management
recovery management
rajshreemuthiah
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
rajshreemuthiah
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
rajshreemuthiah
 
os linux
os linuxos linux
os linux
rajshreemuthiah
 

More from rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Data transfer and manipulation

  • 2. Items • Definition • Data transfer instruction • Data manipulation Arithmetic instruction Logical and bit manipulation instruction Shift instruction • Program control instruction
  • 3. Data transfer and manipulation Computer provides an extensive set of instruction to give the user flexibility to carry out various computational task. The instruction set of different computer differ from each other mostly in the way the operands are determined from address and mode field. The actual operation available in the istruction from one computer to another.
  • 4. Cont… Computer instruction can be classified into three categories:- • Data transfer instruction • Data manipulation instruction • Program control Data transfer instruction cause transfer of data from one location to another with out changing the binary information content.
  • 5. Cont… Data manipulation instruction are those perform arithmetic, logical and shift operation. The program taken control instruction provide decision making capability and changes to taken by program when executed in the computer.
  • 6. Data transfer instruction • Data transfer instruction move data from one place in the computer to another with out changing the data contents. • The most common transfer are between memory and processer register between processer register and input or output and between processer register themselves.
  • 7. Cont… NAME MNEMONIC Load LD Store ST Move MOV Exchange XCH Input IN Output OUT Push PUSH Pop POP
  • 8. Data manipulation instruction Data manipulation instruction perform operation on data and provide the computational capabilities for computer. There are three basic types • Arithmetic instruction • Logical ad bit manipulation instruction • Shift instruction
  • 9. Arithmetic instruction • The basic arithmetic operation are addition, subtraction, multiplication and division. • Most computer provide instruction for all four operation. • Some small computer have only addition and possibly subtraction instruction the multiplication and division must then be generated by means of software subroutine.
  • 10. Logical and bit manipulation instruction • Logical instruction perform binary operation on strings of bits stored in register. They are useful for manipulation individual bits or group of bits that represent binary coded information. • The AND, OR and XOR instruction produce the corresponding logical operation on individual bits of the operands. Although they performed the Boolean operations.
  • 11. Shift instruction • Instruction to shift the contents of an operand are quite useful and are often provide in several variations. • Shift are operations in which the bit of a word are moved to the left or right. • The bit shifted in at the end of the word determines the type of the shift used. • Shift instruction may specify either logical shift , arithmetic shift or rotate type operation. In either case the shift to be the right or to the left
  • 12. Program control • Instruction are always stored in successive memory location. • When processed in the CPU the instruction are fetched from consecutive memory location executed. • Each time an instruction is fetched from memory. The program counter is incremented so that it contains the address of the next instruction in sequences.
  • 13. Cont… Name Mnemonic Branch BR Jump JMP Skip SKP Call CALL Return RET