Found 312 Articles for Computer Architecture

Discuss the Data Transfer Schemes in Computer Architecture?

Ginni
Updated on 27-Jul-2021 13:46:06

13K+ Views

In data transfer schemes, it can provide an efficient means of transmitting data between the processing unit and the I/O devices. In a computer, the data transfer happens between any of these combinations CPU and memory, CPU and I/O devices, and memory and I/O devices.A computer is interfaced with many devices of different speeds. Therefore, I/O devices may not be ready to transfer data as soon as the microprocessor issues the instruction for this purpose. Many data transfer schemes have been developed to solve this problem.Classification of Data Transfer SchemesThe data transfer schemes have been broadly classified into two categories ... Read More

Discuss the I/O Interface in Computer Architecture?

Ginni
Updated on 13-Sep-2023 15:57:15

30K+ Views

The I/O interface supports a method by which data is transferred between internal storage and external I/O devices. All the peripherals connected to a computer require special communication connections for interfacing them with the CPU.I/O Bus and Interface ModulesThe I/O bus is the route used for peripheral devices to interact with the computer processor. A typical connection of the I/O bus to I/O devices is shown in the figure.The I/O bus includes data lines, address lines, and control lines. In any general-purpose computer, the magnetic disk, printer, and keyboard, and display terminal are commonly employed. Each peripheral unit has an ... Read More

What is ASCII Alphanumeric Characters in Computer Architecture?

Ginni
Updated on 27-Jul-2021 13:42:47

2K+ Views

ASCII represents American Standard Code for Information Interchange. It is the standard binary code used to represent alphanumeric characters. Alphanumeric characters are used for the transfer of information to and from the I/O devices and the computer. This standard helps seven bits to code 128 characters. However, there is an additional bit on the left that is always assigned 0. Therefore, there are 8 bits in total.The ASCII code consists of 34 nonprinting characters and 94 characters used for various control operations. There are 26 uppercase letters A through Z, 26 lowercase letters a through z, numerals from 0 to ... Read More

What are Peripheral Devices?

Ginni
Updated on 21-Oct-2023 13:50:30

22K+ Views

Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and display processed data. The devices used to perform these functions are called peripherals or I/O devices.Peripherals read information from or write in the memory unit on receiving a command from the CPU. They are considered to be a part of the total computer system. As they require a conversion of ... Read More

What is Booth Multiplication Algorithm in Computer Architecture?

Ginni
Updated on 27-Jul-2021 13:36:51

6K+ Views

The Booth multiplication algorithm defines a multiplication algorithm that can multiply two signed binary numbers in two’s complement. This algorithm helps in the study of computer architecture.Booth’s algorithm contains the addition of one of two predetermined values (A and S) to a product (P) continually and then implementing a rightward arithmetic shift on the product (P). Let us consider the predetermined values to be A and S, and the product to be P. Consider that the multiplicand and multiplier are m and r respectively. Let the number of bits in m and r be x and y respectively.The Booth’s multiplication ... Read More

Discuss the Hardware Algorithm in Computer Architecture?

Ginni
Updated on 27-Jul-2021 13:35:16

2K+ Views

An algorithm to multiply two numbers is known as the multiplication algorithm. The hardware multiply algorithm is used in digital electronics such as computers to multiply binary digits. The figure shows the flowchart for the hardware multiply algorithm.In the flowchart shown in the figure, the multiplicand is in Y and the multiplier is in Q. The signs related to Y8 and Q8 are in respectively. These signs are compared and both X and Q are set to correspond to the sign of the product because a double-length product will be stored in registers X and Q.The registers X and E ... Read More

What is the subtraction of binary numbers?

Ginni
Updated on 27-Jul-2021 13:33:35

624 Views

Binary numbers are subtracted by performing two’s complement on the subtrahend. Two’s complement is done through the following steps −Complement every digit. That is, change 1 to 0 and 0 to 1.Add 1 to the output.The following example illustrates the subtraction operation of binary digits using the above-mentioned steps.Example: 11101011 - 01100110The second value 01100110 is to be subtracted from the first value 11101011.First apply two’s complement to the second value 01100110, i.e., follow the two steps as shown.Step 1: 0 1 1 0 0 1 1 0 1 0 0 1 1 0 0 1 (change 1 to 0 ... Read More

What is the addition of binary numbers?

Ginni
Updated on 27-Jul-2021 13:03:50

568 Views

The addition of binary numbers is easy yet tedious at the same time. It is a fundamental feature of digital computers, and hence it is important to know how to add binary digits.Almost all the operations of a computer depend on binary addition. Once we understand the addition of two binary digits, it is easier to understand subtraction, multiplication, and division of binary digits.We can start by adding two binary bits. As you are aware a bit can be either 0 or 1. Therefore, we can have only four possible input combinations. The four possible input combinations and their output ... Read More

What is the difference between RISC and CISC in Computer Architecture?

Ginni
Updated on 27-Jul-2021 12:45:33

7K+ Views

RISCRISC represents Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations. In RISC, all instructions have simple register addressing and hence use less number of addressing modes.CISCCISC represents Complex Instruction Set Computer. It comprises a complex instruction set. It incorporates a variable-length instruction format. Instructions that require register operands may take only two bytes.If the computer has 32-bit words (four bytes), the first instruction occupies half a word, while the second instruction needs ... Read More

What is RISC Processor?

Ginni
Updated on 27-Jul-2021 12:44:30

15K+ Views

RISC stands for Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations.Thus, data is stored in processor registers for computations, and results of the computations are transferred to the memory using store instructions. All operations are performed within the registers of the CPU. In RISC, all instructions have simple register addressing and hence use less number of addressing modes.RISC uses relatively a simple instruction format and is easy to decode. Here, the instruction ... Read More

Previous 1 ... 7 8 9 10 11 ... 32 Next
Advertisements