Explain about microcomputers, Computer Engineering

Assignment Help:

Q. Explain about Microcomputers?

Microcomputers: A microcomputer's CPU is a microprocessor. They are characteristically used as single usercomputer though present day microcomputers are very powerful. They can support highly interactive environment especially like GUI (graphical user interface) like windows. These computers are famous for home and business applications. The microcomputer initiated in late 1970's. First microcomputers were built around 8-bit microprocessor chips. What do we understand by an 8-bit chip? It implies that chip can retrieve instructions/data from storage, manipulate as well as process an 8-bit data at a time or we can say that chip has a built- in 8-bit data transfer path. A development on 8-bit chip technology was seen in early 1980s when a series of 16-bit chips called 8086 and 8088 were developed by Intel Corporation every one with advancement over the other one.

8088 was an 8/16 bit chip which means that an 8-bit path is used to transfer data between chip and primary storage (external path) however processing was done within the chip employing a 16-bit path (internal path) at a time. 8086 was a 16/16-bit chip it implies that external and internal paths both were 16 bits wide. Both of these chips could support a primary memory of storage capacity of 1 MB (Mega Byte).

Identical to Intel's chip series there exist another famous chip series of Motorola. First16-bit microprocessor of this series was MC 68000. It was a 16/32-bit chip as well as could support up to 16 MB of primary storage. Advancement over 16/32 bit chips was 32/32 chips. A number of the famous 32-bit chips were Intel's 80486 and MC 68020chip.


Related Discussions:- Explain about microcomputers

Define dma, Define DMA. The transfer of data among a fast storage devic...

Define DMA. The transfer of data among a fast storage device such as magnetic disk and memory if often limited by the speed of the CPU. Removing the CPU from the path and letti

What are the values of the slack or surplus variables, Consider the followi...

Consider the following linear programming problem: Minimize:        70M + 40N Subject to:           3M + 7N ≥ 233                             10M + 2N ≥ 254

Illustration of an instruction cycle, Q. Illustration of an instruction cyc...

Q. Illustration of an instruction cycle? Instruction cycle displayed in given figure comprises subsequent stages: First address of the subsequent instruction is calculat

What is the significance of nonactionattribute, In general, all public proc...

In general, all public processes of a controller class are treated as action processes. If you require prevent this default behaviour, just decorate the public process with NonActi

What are types of firewalls, What are types of firewalls? There are con...

What are types of firewalls? There are conceptually two types of firewalls as: 1. Network Level 2. Application Level

Conducting materials, calculate the number of states per unit volume in an ...

calculate the number of states per unit volume in an energy interval of 0.01eV above the Fermi energy of Na metal. The Fermi energy of Na at 0 K=3eV.

Role of internet, What are the roles of Internet, Intranet and extranet in ...

What are the roles of Internet, Intranet and extranet in e-business? Role of Internet, Intranet and extranet into e-business: The given information activities are carried

Show the characteristic of cache memory, Q. Show the characteristic of cach...

Q. Show the characteristic of cache memory? The essential characteristic of cache memory is its fast access time. So very little or no time should be wasted when searching for

Explain a schematic diagram of thousand line exchanges, Using a combination...

Using a combination of uniselectors and two motion selectors draw a schematic of thousand line exchanges. The schematic diagram for such an exchange is demonstrated in Fig. All

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd