Basic operational concepts of a computer, Computer Engineering

Assignment Help:

Basic Operational Concepts of a Computer:

  • Most of computer operations are executed in the ALU (arithmetic and logic unit) of a processor.
  • For an example: to add 2 numbers that are both located in memory.

-          Each number is taken into the processor, and the definite addition is performed by the ALU.

-          Then sum may be stored in memory or retained in the processor for immediate use.

Registers

  • When operands are taken into the processor, they are stored in high-speed storage elements (registers).
  • A register may store 1 piece of data (8-bit registers, 16-bit registers, 32-bit registers, 64-bit registers, etc...)
  • Access times to registers are quicker than access times to the fastest cache unit in the memory hierarchy.

Instructions

  • The Instructions for a processor are declare in the ISA (Instruction Set Architecture)- Level 2
  • Typical instructions include following:
  • Mov BX, LocA

1.      First fetch the instruction

2.      Fetch the contents of  the memory location LocA

3.      Store the contents in general purpose register BX

  • Add AX,BX

1.      Fetch the instruction

2.      Add the contents of registers BX and AX

3.      Place the sum in register AX


Related Discussions:- Basic operational concepts of a computer

Show the programmes for parallel systems, Q. Show the Programmes for Parall...

Q. Show the Programmes for Parallel Systems? Adding elements of an array using two processor      int sum, A[ n] ;  //shared variables

Which method uses the greatest number of layers in OSI model, Which method ...

Which method uses the greatest number of layers in the OSI model? Gateway utilizes the greatest number of layers into the OSI model.

Backward chaining, Backward Chaining: In generally given that we are o...

Backward Chaining: In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backward

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Differentiate b/w program translation and interpretation, Differentiate bet...

Differentiate between program translation and program interpretation. The program translation model makes the execution gap through translating a program written in a program

How do you find out if a linked-list has an end, By 2 pointers you can find...

By 2 pointers you can find it. One of them goes 2 nodes each time. The second one goes at 1 node each time. If there is a cycle, the one that goes 2 nodes every time will eventuall

Operator, write algorithm and draw flowchart for exchange the values of two...

write algorithm and draw flowchart for exchange the values of two variables.

Mplement a second-order low-pass filter using the finite dif, you will impl...

you will implement a second-order low-pass filter using the finite difference method. The finite difference method is a useful mathematical method that is used to numerically solve

What is the role of ir and pc, What is the role of IR and PC?  Instruct...

What is the role of IR and PC?  Instruction Register (IR) having the instruction being implemented. Its output is available to the control circuits, which make the timing signa

Discuss the important characteristics of 8237, Question 1 Discuss the w...

Question 1 Discuss the working principle of an interrupt and hardware actions in interrupt handling 2 Discuss the important characteristics of 8237 3 Describe the format

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd