Enviar pesquisa
Carregar
Technology technology.ppt
•
Transferir como PPT, PDF
•
0 gostou
•
8 visualizações
S
sheryl90
Seguir
Tech
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Baixar agora
Recomendados
CHAP1.ppt
CHAP1.ppt
sani299758
CHAP1.ppt
CHAP1.ppt
IanReid57
najjar_chap1.ppt
najjar_chap1.ppt
dipakshow1
Chap1
Chap1
None Theless
Computer Fundamentals
Computer Fundamentals
Prof. Erwin Globio
Infrastructure student
Infrastructure student
John Scrugham
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
It technician
It technician
Edz Gapuz
Recomendados
CHAP1.ppt
CHAP1.ppt
sani299758
CHAP1.ppt
CHAP1.ppt
IanReid57
najjar_chap1.ppt
najjar_chap1.ppt
dipakshow1
Chap1
Chap1
None Theless
Computer Fundamentals
Computer Fundamentals
Prof. Erwin Globio
Infrastructure student
Infrastructure student
John Scrugham
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
It technician
It technician
Edz Gapuz
aftercomputer fax waleed cv
aftercomputer fax waleed cv
waleed seif
Cluster Tutorial
Cluster Tutorial
cybercbm
Network emulation with data rates
Network emulation with data rates
Packet Storm
U2
U2
Khalid Al-Ghanim
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
John Archer
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
BradleyNoels
Reconfigurable Computing
Reconfigurable Computing
ppd1961
Software Engineering
Software Engineering
JayaKamal
Michael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
Mike Sawall
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
MIS - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
Embedded C workshop
Embedded C workshop
Mostafa El-koumy
Career in computer Hardware & Networking
Career in computer Hardware & Networking
NavjotKaur124
Architecture presentation
Architecture presentation
Md. Touhidur Rahman
ResumeRossNagarasan
ResumeRossNagarasan
Ross Nagarasan
Application Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
1. computers introduction
1. computers introduction
Dr.N.Poorna Chelvan
IJSRED-V2I2P57
IJSRED-V2I2P57
IJSRED
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
Aron Kondoro
Interactive glossary
Interactive glossary
Otarola93
competitive advantage (1).ppt
competitive advantage (1).ppt
sheryl90
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
sheryl90
Mais conteúdo relacionado
Semelhante a Technology technology.ppt
aftercomputer fax waleed cv
aftercomputer fax waleed cv
waleed seif
Cluster Tutorial
Cluster Tutorial
cybercbm
Network emulation with data rates
Network emulation with data rates
Packet Storm
U2
U2
Khalid Al-Ghanim
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
John Archer
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
BradleyNoels
Reconfigurable Computing
Reconfigurable Computing
ppd1961
Software Engineering
Software Engineering
JayaKamal
Michael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
Mike Sawall
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
MIS - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
Embedded C workshop
Embedded C workshop
Mostafa El-koumy
Career in computer Hardware & Networking
Career in computer Hardware & Networking
NavjotKaur124
Architecture presentation
Architecture presentation
Md. Touhidur Rahman
ResumeRossNagarasan
ResumeRossNagarasan
Ross Nagarasan
Application Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
1. computers introduction
1. computers introduction
Dr.N.Poorna Chelvan
IJSRED-V2I2P57
IJSRED-V2I2P57
IJSRED
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
Aron Kondoro
Interactive glossary
Interactive glossary
Otarola93
Semelhante a Technology technology.ppt
(20)
aftercomputer fax waleed cv
aftercomputer fax waleed cv
Cluster Tutorial
Cluster Tutorial
Network emulation with data rates
Network emulation with data rates
U2
U2
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Reconfigurable Computing
Reconfigurable Computing
Software Engineering
Software Engineering
Michael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
MIS - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Embedded C workshop
Embedded C workshop
Career in computer Hardware & Networking
Career in computer Hardware & Networking
Architecture presentation
Architecture presentation
ResumeRossNagarasan
ResumeRossNagarasan
Application Of An Operating System Security
Application Of An Operating System Security
1. computers introduction
1. computers introduction
IJSRED-V2I2P57
IJSRED-V2I2P57
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
Interactive glossary
Interactive glossary
Mais de sheryl90
competitive advantage (1).ppt
competitive advantage (1).ppt
sheryl90
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
sheryl90
Chapter10_mis.ppt
Chapter10_mis.ppt
sheryl90
83172_pp7.ppt
83172_pp7.ppt
sheryl90
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
sheryl90
kumar.pptx
kumar.pptx
sheryl90
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
sheryl90
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
sheryl90
competitive advantage.ppt
competitive advantage.ppt
sheryl90
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
sheryl90
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
sheryl90
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
sheryl90
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
sheryl90
IS-Overview.ppt
IS-Overview.ppt
sheryl90
ch03.ppt
ch03.ppt
sheryl90
ch01_02.ppt
ch01_02.ppt
sheryl90
Mais de sheryl90
(19)
competitive advantage (1).ppt
competitive advantage (1).ppt
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
Chapter10_mis.ppt
Chapter10_mis.ppt
83172_pp7.ppt
83172_pp7.ppt
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
kumar.pptx
kumar.pptx
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
competitive advantage.ppt
competitive advantage.ppt
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
IS-Overview.ppt
IS-Overview.ppt
ch03.ppt
ch03.ppt
ch01_02.ppt
ch01_02.ppt
Último
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Último
(20)
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Technology technology.ppt
1.
Introduction to Computing
Systems from bits & gates to C & beyond Chapter 1 Welcome Aboard!
2.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 2 • What computers consist of • How computers work • How they are organized internally • What are the design tradeoffs • How design affects programming and applications • How to fix computers • How to build myself one real cheap • Which one to buy • Knowing all about the Pentium IV or PowerPC This course is about:
3.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 3 Computing Machines Ubiquitous ( = everywhere) General purpose: servers, desktops, laptops, PDAs, etc. Special purpose: cash registers, ATMs, games, telephone switches, etc. Embedded: cars, hotel doors, printers, VCRs, industrial machinery, medical equipment, etc. Distinguishing Characteristics Speed Cost Ease of use, software support & interface Scalability
4.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 4 Two recurring themes Abstraction The notion that we can concentrate on one “level” of the big picture at a time, with confidence that we can then connect effectively with the levels above and below. Framing the levels of abstraction appropriately is one of the most important skills in any undertaking. Hardware vs. Software On the other hand, abstraction does not mean being clueless about the neighboring levels. In particular, hardware and software are inseparably connected, especially at the level we will be studying.
5.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 5 What is Computer Organization? … a very wide semantic gap between the intended behavior and the workings of the underlying electronic devices that will actually do all the work. The forerunners to modern computers attempted to assemble the raw devices (mechanical, electrical, or electronic) into a separate purpose-built machine for each desired behavior. Electronic Devices Desired Behavior
6.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 6 Role of General Purpose Computers A general purpose computer is like an island that helps span the gap between the desired behavior (application) and the basic building blocks (electronic devices). Electronic Devices Desired Behavior General Purpose Computer computer organization software
7.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 7 CPUs: the heart of computing systems ca 1980 It took 10 of these boards to make a Central Processing Unit ca 2000 You can see why they called this CPU a microprocessor!
8.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 8 Two pillars of Computing Universal Computational Devices Given enough time and memory, all computers are capable of computing exactly the same things (irrespective of speed, size or cost). Turing’s Thesis: every computation can be performed by some “Turing Machine” - a theoretical universal computational device Problem Transformation The ultimate objective is to transform a problem expressed in natural language into electrons running around a circuit! That’s what Computer Science and Computer Engineering are all about: a continuum that embraces software & hardware.
9.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 9 A Turing Machine Also known as a Universal Computational Device: a theoretical device that accepts both input data and instructions as to how to operate on the data
10.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 10 Problem Transformation - levels of abstraction Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits The desired behavior: the application The building blocks: electronic devices
11.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 11 Levels of Abstraction These levels do not necessarily correspond to discrete components, but to well defined standard interfaces. Standard interfaces provide portability third party software/hardware wider usage These levels are to some extent arbitrary - there are other ways to draw the lines. Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits
12.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 12 The Program Level Most computers run a management program called the operating system (OS). Application programs interface to the machine architecture via the OS. An example: Application Program Operating System Program (Software) This lecture PowerPoint Windows XP Data Application Program Operating System
13.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 13 The Machine Level - 1 Machine Architecture This is the formal specification of all the functions a particular machine can carry out, known as the Instruction Set Architecture (ISA). Microarchitecture The implementation of the ISA in a specific CPU - i.e. the way in which the specifications of the ISA are actually carried out.
14.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 14 The Machine Level - 2 Logic Circuits Each functional component of the microarchitecture is built up of circuits that make “decisions” based on simple rules Devices Finally, each logic circuit is actually built of electronic devices such as CMOS or NMOS or GaAs (etc.) transistors.
15.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 15 Course Outline - What is Next? How to represent information The building blocks of computers: logic gates The basic algorithm: the von Neumann model An example: the LC-3 structure and language Programming the machine: assembly language A higher-level language: C
16.
Copyright © 2003
The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside What is next? 1 - 16
Baixar agora