SlideShare uma empresa Scribd logo
1 de 27
IBM PC Assembly Language and Programming by Peter AbelChapter 1: Basic Feature of PC hardware Mohammed Nazimuddin(나짐)  Email:nazim@eslab.inha.ac.kr 1210 Hi-tech centre.
Hardware Features Internal Hardware Processor Memory Register External hardware Keyboard Monitor Disk CD-ROM
Bits and Bytes Bits  The fundamental building block of computer storage is Bit. A bit may be Off  0 On  1
Bytes A group of nine related bits The eight data bits provide the basis for binary arithmetic and characters ,[object Object],One Bit parity. Rules of Parity Must be odd in each byte ,[object Object],Represents a storage Location
Related Bytes Word 2-Byte(16-bit) Double Word 4-Byte(32-bit) Quadword 8-Byte(64-bit) Paragraph 16-byte(128) Kilobyte(KB) Megabyte(MB)
Number system Binary Base 2 (0,1) Binary to Decimal 01000001 Bits are numbered from the right to left. ,[object Object],Subscripts represent the place value, e.g.  ,[object Object],Conversion to decimal is done by evaluating the polynomial ,[object Object]
In this case, 0+64+0+0+0+0+0+1 = 65,[object Object]
HEXADECIMAL Base 16(0 to 9, A..F) ,[object Object]
Expand each hex digit to the equivalent 4-bit binary form
You may omit leading zeros of leftmost digit
37h = 0011 0111b
(or 110111b)
Binary to Hex
Group bits by fours (starting with least significant bits)
Add leading zeros as necessary to complete the last group
Convert each group to the equivalent hex digit
0100 1110b = 4Eh,[object Object]
Numeric Data Binary storage two’s complement, one’s complement, sign and magnitude, or biased representations ASCII storage sequence of ASCII bytes representing the digits of the number expressed in some radix Binary Coded Decimal sequence of nybbles representing digits 0-9 of the number
Binary Storage A pre-arranged storage size is used typically byte, word, doubleword, or quadword Represent a number in base two and encode the bits 197d is 11000101b at least 8 bits will be required to store this number (leading zeros are added if necessary to fill additional bits for larger storage sizes)
Signed vs Unsigned Codes ,[object Object]
two’s complement code is most common
only 7 bits are used for the magnitude
Minimum -128 is coded as 10000000b
Maximum +127 is coded as 01111111b
Zero is 00000000b
Unsigned Byte
all 8 bits used to represent the magnitude of the number

Mais conteúdo relacionado

Mais procurados

Data representation
Data representationData representation
Data representationrozanadiana
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2Umang Gupta
 
How computers represent data
How computers represent dataHow computers represent data
How computers represent dataShaon Ahmed
 
Chapter 03 number system
Chapter 03 number systemChapter 03 number system
Chapter 03 number systemIIUI
 
Computer Systems Data Representation
Computer Systems   Data RepresentationComputer Systems   Data Representation
Computer Systems Data Representationiarthur
 
Topic 1 Data Representation
Topic 1 Data RepresentationTopic 1 Data Representation
Topic 1 Data Representationekul
 
C:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 BC:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 Bececourse
 
Data representation
Data representationData representation
Data representationMysore
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction iAhmed Saber
 
Logic design and switching theory
Logic design and switching theoryLogic design and switching theory
Logic design and switching theoryjomerson remorosa
 
Digital Comprator
Digital CompratorDigital Comprator
Digital Compratorsuraj829
 
Data representation moris mano ch 03
Data representation   moris mano ch  03Data representation   moris mano ch  03
Data representation moris mano ch 03thearticlenow
 

Mais procurados (20)

Data representation
Data representationData representation
Data representation
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2
 
How computers represent data
How computers represent dataHow computers represent data
How computers represent data
 
Data representation
Data representationData representation
Data representation
 
Chapter 03 number system
Chapter 03 number systemChapter 03 number system
Chapter 03 number system
 
Vhdl introduction
Vhdl introductionVhdl introduction
Vhdl introduction
 
Meghna ppt.
Meghna ppt.Meghna ppt.
Meghna ppt.
 
Computer Systems Data Representation
Computer Systems   Data RepresentationComputer Systems   Data Representation
Computer Systems Data Representation
 
Topic 1 Data Representation
Topic 1 Data RepresentationTopic 1 Data Representation
Topic 1 Data Representation
 
C:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 BC:\Fakepath\Chapter 2 Part2 B
C:\Fakepath\Chapter 2 Part2 B
 
Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
 
Logic design and switching theory
Logic design and switching theoryLogic design and switching theory
Logic design and switching theory
 
Digital Comprator
Digital CompratorDigital Comprator
Digital Comprator
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Data representation in computers
Data representation in computersData representation in computers
Data representation in computers
 
Number system
Number system Number system
Number system
 
Data representation moris mano ch 03
Data representation   moris mano ch  03Data representation   moris mano ch  03
Data representation moris mano ch 03
 

Destaque

Logo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajnLogo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajnTotal Dizajn Digital
 
Typek flying local flag
Typek flying local flagTypek flying local flag
Typek flying local flagCheryl King
 
J.C. Jones quotes
J.C. Jones quotesJ.C. Jones quotes
J.C. Jones quotesLuca Galli
 
Инфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондацииИнфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондацииМЦМС | MCIC
 
Salesguru.Pl na Bootstrapie
Salesguru.Pl na BootstrapieSalesguru.Pl na Bootstrapie
Salesguru.Pl na BootstrapieBootstrap
 
Bosc Intro 20090627
Bosc Intro 20090627Bosc Intro 20090627
Bosc Intro 20090627bosc
 
MiMo09
MiMo09MiMo09
MiMo09semdev
 

Destaque (8)

Logo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajnLogo dizajn za salon Alhemija by totaldizajn
Logo dizajn za salon Alhemija by totaldizajn
 
Typek flying local flag
Typek flying local flagTypek flying local flag
Typek flying local flag
 
J.C. Jones quotes
J.C. Jones quotesJ.C. Jones quotes
J.C. Jones quotes
 
Инфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондацииИнфо настани за новиот Закон за здруженија и фондации
Инфо настани за новиот Закон за здруженија и фондации
 
dobry dizajn
dobry dizajndobry dizajn
dobry dizajn
 
Salesguru.Pl na Bootstrapie
Salesguru.Pl na BootstrapieSalesguru.Pl na Bootstrapie
Salesguru.Pl na Bootstrapie
 
Bosc Intro 20090627
Bosc Intro 20090627Bosc Intro 20090627
Bosc Intro 20090627
 
MiMo09
MiMo09MiMo09
MiMo09
 

Semelhante a PC HARDWARE FEATURES

Module 1-ppt System programming
Module 1-ppt System programmingModule 1-ppt System programming
Module 1-ppt System programmingvishnu sankar
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfsaimawarsi
 
6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptxHebaEng
 
system software 16 marks
system software 16 markssystem software 16 marks
system software 16 marksvvcetit
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs RevnorthVU
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Siraj Ahmed
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets CharacteristicsJeanie Delos Arcos
 
Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Khaja Dileef
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptxSachinKupade
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadYogesh Deshpande
 
SAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSORSAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSORSAURABH MITRA
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxBhawaniShankarSahu1
 
LECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphesLECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphesAhmedMahjoub15
 
Unit 3 assembler and processor
Unit 3   assembler and processorUnit 3   assembler and processor
Unit 3 assembler and processorAbha Damani
 

Semelhante a PC HARDWARE FEATURES (20)

Module 1-ppt System programming
Module 1-ppt System programmingModule 1-ppt System programming
Module 1-ppt System programming
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
 
6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx6_2018_11_23!09_24_56_PM (1).pptx
6_2018_11_23!09_24_56_PM (1).pptx
 
system software 16 marks
system software 16 markssystem software 16 marks
system software 16 marks
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs Rev
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
Wk1to4
Wk1to4Wk1to4
Wk1to4
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2Systemsoftwarenotes 100929171256-phpapp02 2
Systemsoftwarenotes 100929171256-phpapp02 2
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptx
 
Intel 8086
Intel 8086 Intel 8086
Intel 8086
 
Coa presentation1
Coa presentation1Coa presentation1
Coa presentation1
 
Chap 01[1]
Chap 01[1]Chap 01[1]
Chap 01[1]
 
Pai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_uploadPai unit 1_l1-l2-l3-l4_upload
Pai unit 1_l1-l2-l3-l4_upload
 
SAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSORSAURABH MITRA-8086 MICROPROCESSOR
SAURABH MITRA-8086 MICROPROCESSOR
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
 
LECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphesLECTURE2 td 2 sue les theories de graphes
LECTURE2 td 2 sue les theories de graphes
 
Unit 3 assembler and processor
Unit 3   assembler and processorUnit 3   assembler and processor
Unit 3 assembler and processor
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

PC HARDWARE FEATURES

  • 1. IBM PC Assembly Language and Programming by Peter AbelChapter 1: Basic Feature of PC hardware Mohammed Nazimuddin(나짐) Email:nazim@eslab.inha.ac.kr 1210 Hi-tech centre.
  • 2. Hardware Features Internal Hardware Processor Memory Register External hardware Keyboard Monitor Disk CD-ROM
  • 3. Bits and Bytes Bits The fundamental building block of computer storage is Bit. A bit may be Off  0 On  1
  • 4.
  • 5. Related Bytes Word 2-Byte(16-bit) Double Word 4-Byte(32-bit) Quadword 8-Byte(64-bit) Paragraph 16-byte(128) Kilobyte(KB) Megabyte(MB)
  • 6.
  • 7.
  • 8.
  • 9. Expand each hex digit to the equivalent 4-bit binary form
  • 10. You may omit leading zeros of leftmost digit
  • 11. 37h = 0011 0111b
  • 14. Group bits by fours (starting with least significant bits)
  • 15. Add leading zeros as necessary to complete the last group
  • 16. Convert each group to the equivalent hex digit
  • 17.
  • 18. Numeric Data Binary storage two’s complement, one’s complement, sign and magnitude, or biased representations ASCII storage sequence of ASCII bytes representing the digits of the number expressed in some radix Binary Coded Decimal sequence of nybbles representing digits 0-9 of the number
  • 19. Binary Storage A pre-arranged storage size is used typically byte, word, doubleword, or quadword Represent a number in base two and encode the bits 197d is 11000101b at least 8 bits will be required to store this number (leading zeros are added if necessary to fill additional bits for larger storage sizes)
  • 20.
  • 21. two’s complement code is most common
  • 22. only 7 bits are used for the magnitude
  • 23. Minimum -128 is coded as 10000000b
  • 24. Maximum +127 is coded as 01111111b
  • 27. all 8 bits used to represent the magnitude of the number
  • 28. Minimum 0 (zero) is coded as 00000000b
  • 29.
  • 31. Word
  • 36.
  • 38. Word
  • 43.
  • 44. Use the same algorithm you practiced in second grade!
  • 45. Binary Example: c ccc 10101 + 1111 100100 0+0 = 0 0+1 = 1 1+0 = 1 1+1 = 10 1+1+1 = 11
  • 46. Negative Binary Number A negative binary value is expressed in Two’s complement notation. Two’s complement Reverse the bit Add 1 Example: +65 Reverse bits Add 1 Number -65 01000001 10111110 1 10111111
  • 47. Subtraction How to Subtract 42 from 65 ? 65 : +(-43) : = 22
  • 48. PC Components System Board Processor, main memory, connectors, hard disk, etc… Bus A bus with wires attached to the system board connects the components. Processor 8088,8086,80286….Pentium Execution and Bus control unit
  • 49. Execution and Bus control Unit EU: Execution Unit BIU: Bus interface Unit Program control Instruction Queue . .
  • 50. Intel 8086 Organization Registers - storage locations found inside the processor for temporary storage of data Data Registers (16-bit) AX, BX, CX, DX Address Registers (16-bit) Segment registers: CS, SS, DS, ES Pointer registers: SP, BP, IP Index registers: SI, DI Status (Flags) register (16-bit)
  • 51. Data Registers The data registers may be used for general purposes, however each has special uses AX : Accumulator BX : Base CX : Count DX : Data Each byte of the 4 data registers can be accessed independently AH, AL, BH, etc. These are referred to as 8-bit registers, but remember they are part of an existing register
  • 52. Memory 8086 - 1 megabyte of memory (220 bytes) Each byte is accessed by specifying an address (00000h through FFFFFh) 20-bit addresses must be formed from 16-bits of information
  • 53. Interrupt Vectors BIOS and DOS Data DOS Application Program Area Video Reserved BIOS
  • 54. Segment Registers 20-bit addresses are obtained by combining two 16-bit registers, segment:offset Address = segment*16(10h)+offset Example CS: 010C IP: 14D2 Address = 010C*10+14D2 = 010C0+14D2 Address = 02592 Each segment is 64K, segments can start at any paragraph boundary
  • 55. Program Segments During program execution, the segment registers are only changed if memory not currently accessible in an active segment must be accessed Program bytes are arranged into distinct segments for convenience CS -> segment containing machine instructions SS -> segment containing storage for the stack DS -> segment containing data values and storage ES -> segment for additional data or special memory operations Programmers must be aware of this organization
  • 56. Instruction and Stack Pointers IP contains the address of the next instruction to be executed IP specifies an offset into the CS segment IP is not the operand of any instruction SP points to the top item on the stack SP is an offset into the SS segment SP can be used as an operand in some instructions
  • 57. BP and Index Registers BP is a Base Pointer Specifies an offset into any segment, but most commonly the Stack segment SI and DI are called Index registers They normally specify an offset into the Data segment, although they can be used as offsets into any segment Sometimes they hold a number to be added to the address of an array (index)
  • 58. Flags Individual bits are used to store the status of the microprocessor Bits are set or cleared as the result of many operations Bits may be affected indirectly (by the execution of an instruction) or directly by an instruction designed to access the status word.