Ginni

Ginni

1,237 Articles Published

Articles by Ginni

Page 25 of 124

What is General Register Organization?

Ginni
Ginni
Updated on 31-Oct-2023 92K+ Views

A set of flip-flops forms a register. A register is a unique high-speed storage area in the CPU. They include combinational circuits that implement data processing. The information is always defined in a register before processing. The registers speed up the implementation of programs.Registers implement two important functions in the CPU operation are as follows −It can support a temporary storage location for data. This supports the directly implementing programs to have fast access to the data if required.It can save the status of the CPU and data about the directly implementing program.Example − Address of the next program instruction, ...

Read More

What is techniques of storage allocation in compiler design?

Ginni
Ginni
Updated on 31-Oct-2023 59K+ Views

There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in a language. In static allocation, the compiler can decide the amount of storage needed by each data object. Thus, it becomes easy for a compiler to identify the address of these data in the activation record.FORTRAN uses this kind of storage allocation strategies.AdvantagesIt is easy to implement.It allows type checking ...

Read More

What is Handshaking?

Ginni
Ginni
Updated on 31-Oct-2023 36K+ Views

Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The drawback of the strobe approach is that the source unit that starts the transfer has no method of knowing whether the destination unit has received the data element that was located in the bus. A destination unit that initiates the transfer has no method of knowing whether the source unit ...

Read More

What is Pipelining in Computer Architecture?

Ginni
Ginni
Updated on 31-Oct-2023 32K+ Views

Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar to assembly lines.A basic pipeline processes a sequence of tasks, including instructions, as per the following principle of operation −Each task is subdivided into multiple successive subtasks as shown in the figure. For instance, the execution of register-register instructions can be broken down into instruction fetch, decode, execute, and writeback.A ...

Read More

What is Auxiliary Memory?

Ginni
Ginni
Updated on 26-Oct-2023 43K+ Views

An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA magnetic disk is a round plate generated of metal or plastic coated with magnetized material. There are both sides of the disk are used and multiple disks can be stacked on one spindle with read/write heads accessible on each surface.All disks revolve together at high speed and are not stopped ...

Read More

What is Syntax Tree?

Ginni
Ginni
Updated on 26-Oct-2023 31K+ Views

Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can be executed as data with multiple fields. In the node for an operator, one field recognizes the operator and the remaining field includes a pointer to the nodes for the operands. The operator is known as the label of the node. The following functions are used to create the nodes ...

Read More

What are the principles of Public key Cryptosystem in Information Security?

Ginni
Ginni
Updated on 22-Oct-2023 45K+ Views

Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an attempt to attack two of the most complex problems related to symmetric encryption. The first issue is that key distribution. Key distribution under symmetric encryption needed such as − that two communicants already shared a key, which somehow has been ...

Read More

What are the substitution techniques in information security?

Ginni
Ginni
Updated on 14-Sep-2023 54K+ Views

Substitution technique is a classical encryption approach where the characters present in the initial message are restored by the other characters or numbers or by symbols. If the plain text (original message) is treated as the string of bits, thus the substitution technique would restore bit pattern of plain text with the bit pattern of cipher text.There are various types of substitution ciphers which are as follows −Monoalphabetic Cipher − In monoalphabetic substitution cipher, a character in a plaintext is always restored or changed to the similar character in the ciphertext indifferent of its position in the text.For instance, if ...

Read More

Discuss the I/O Interface in Computer Architecture?

Ginni
Ginni
Updated on 13-Sep-2023 42K+ Views

The I/O interface supports a method by which data is transferred between internal storage and external I/O devices. All the peripherals connected to a computer require special communication connections for interfacing them with the CPU.I/O Bus and Interface ModulesThe I/O bus is the route used for peripheral devices to interact with the computer processor. A typical connection of the I/O bus to I/O devices is shown in the figure.The I/O bus includes data lines, address lines, and control lines. In any general-purpose computer, the magnetic disk, printer, and keyboard, and display terminal are commonly employed. Each peripheral unit has an ...

Read More

What is Query Optimization?

Ginni
Ginni
Updated on 08-Sep-2023 51K+ Views

Query optimization is of great importance for the performance of a relational database, especially for the execution of complex SQL statements. A query optimizer decides the best methods for implementing each query.The query optimizer selects, for instance, whether or not to use indexes for a given query, and which join methods to use when joining multiple tables. These decisions have a tremendous effect on SQL performance, and query optimization is a key technology for every application, from operational Systems to data warehouse and analytical systems to content management systems.There is the various principle of Query Optimization are as follows −Understand ...

Read More
Showing 241–250 of 1,237 articles
« Prev 1 23 24 25 26 27 124 Next »
Advertisements