Machine Language.

Slides:



Advertisements
Similar presentations
Instruction Sets: Characteristics and Functions Addressing Modes
Advertisements

Chapter 2: Data Manipulation
Fall 2012SYSC 5704: Elements of Computer Systems 1 MicroArchitecture Murdocca, Chapter 5 (selected parts) How to read Chapter 5.
Chapter 2 Data Manipulation Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University 1 Some sldes are adapted from.
Princess Sumaya Univ. Computer Engineering Dept. Chapter 2: IT Students.
ΜP rocessor Architectures To : Eng. Ahmad Hassan By: Group 18.
Computer Architecture and Data Manipulation Chapter 3.
Review and Overview. Review  Combinational logic circuit – Decoder, Encoder, Multiplexer, De-multiplexer, Full Adder, Multiplier  Sequential logic circuit.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter.
Midterm Wednesday Chapter 1-3: Number /character representation and conversion Number arithmetic Combinational logic elements and design (DeMorgan’s Law)
1 Sec (2.1) Computer Architectures. 2 For temporary storage of information, the CPU contains cells, or registers, that are conceptually similar to main.
Data Manipulation Computer System consists of the following parts:
Chapter 2.2 Machine Language.
KEY COMPONENTS OF A COMPUTER SYSTEM ANDREW LOLAVAR.
3 1 3 C H A P T E R Hardware: Input, Processing, and Output Devices.
Lecture 3. Diff b/w RAM and Registers Registers are used to hold data immediately applicable to the operation at hand Registers are used to hold data.
CS 1308 Computer Literacy and the Internet Computer Systems Organization.
Data manipulation, Part one Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
What have mr aldred’s dirty clothes got to do with the cpu
Ch. 2 Data Manipulation 4 The central processing unit. 4 The stored-program concept. 4 Program execution. 4 Other architectures. 4 Arithmetic/logic instructions.
Chapter 5 Computing Components. 5-2 Chapter Goals List the components and their function in a von Neumann machine Describe the fetch-decode-execute cycle.
Data Manipulation CSC 2001 TTU CSC 2001 TTU. Now what?  Program can be represented (and stored) like data. So, now what happens?  The program needs.
Chapter 2 Data Manipulation Yonsei University 1 st Semester, 2015 Sanghyun Park.
Important Concepts  Parts of the CPU  Arithmetic/Logic Unit  Control Unit  Registers  Program Counter  Instruction Register  Fetch/Decode/Execute.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
COMPUTER SCIENCE Data Representation and Machine Concepts Section 2.1 Instructor: Lin Chen Sept 2013.
Chapter 2 Data Manipulation. © 2005 Pearson Addison-Wesley. All rights reserved 2-2 Chapter 2: Data Manipulation 2.1 Computer Architecture 2.2 Machine.
Data Manipulation CSC Overview  Computer Architecture  Machine Language  Computer Architecture  Machine Language.
Copyright © 2015 Pearson Education, Inc. Chapter 2: Data Manipulation.
Lecture 7: 9/17/2002CS149D Fall CS149D Elements of Computer Science Ayman Abdel-Hamid Department of Computer Science Old Dominion University Lecture.
E X C E E D I N G E X P E C T A T I O N S VLIW-RISC CSIS Parallel Architectures and Algorithms Dr. Hoganson Kennesaw State University Instruction.
COMPUTER SCIENCE Data Representation and Machine Concepts Section 2.2 Instructor: Lin Chen Sept 2013.
CS 1308 Computer Literacy and the Internet. Objectives In this chapter, you will learn about:  The components of a computer system  Putting all the.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Data Manipulation Brookshear, J.G. (2012) Computer Science: an Overview.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 5 Computer Systems Organization. Levels of Abstraction – Figure 5.1e The Concept of Abstraction.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 2: Data Manipulation
Page 1 Computer Architecture and Organization 55:035 Midterm Exam Review Spring 2011.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
RISC / CISC Architecture by Derek Ng. Overview CISC Architecture RISC Architecture  Pipelining RISC vs CISC.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
The Processor & its components. The CPU The brain. Performs all major calculations. Controls and manages the operations of other components of the computer.
27 October 2015 Birkbeck College, U. London1 Introduction to Computer Systems Lecturer: Steve Maybank Department of Computer Science and Information Systems.
Machine Language Computer languages cannot be directly interpreted by the computer – they are not in binary. All commands need to be translated into binary.
Teaching Machine to Listen Sol Lerner Chapter 25.
© 2015 Pearson Education Limited 2015 Quiz in last 15 minutes Midterm 1 is next Sunday Assignment 1 due today at 4pm Assignment 2 will be up today; due.
MICROCONTROLLER ARCHITECTURE & ASSEMBLY LANGUAGE PROGRAMMING
Immediate Addressing Mode
Chapter 2: Data Manipulation
Chapter 2: Data Manipulation
Figure 8.1 Architecture of a Simple Computer System.
CS149D Elements of Computer Science
Computer Architecture
Intro to Architecture & Organization
CSCI206 - Computer Organization & Programming
Figure 8.1 Architecture of a Simple Computer System.
Chapter 2: Data Manipulation
Classification of instructions
Chapter 2: Data Manipulation
Course Outline for Computer Architecture
Chapter 2: Data Manipulation
Sec (2.3) Program Execution.
Presentation transcript:

Machine Language

Machine Language To apply the stored-program concept, CPUs are designed to recognize instructions encoded as bit patterns. This collection of instructions along with the encoding system is called the machine language. An instruction expressed in this language is called a machine-level instruction or ,more commonly, a machine instruction.

reduced instruction set computer (RISC) Machine Language reduced instruction set computer (RISC) complex instruction set computer (CISC) Regardless of the choice between RISC and CISC, a machine’s instructions can be categorized into three groupings: (1) the data transfer group, (2) the arithmetic/logic group, and (3) the control group.

Figure 2.6 (Decoding the instruction 3547 ) Machine Language Figure 2.4 (The architecture of the machine described in Appendix C) Figure 2.5 (The composition of an instruction for the machine in Appendix C) Figure 2.6 (Decoding the instruction 3547 ) Figure 2.7 (An encoded version of the instruction in Figure 2.2)

Figure 2.4 The architecture of the machine described in Appendix C

Figure 2.5 The composition of an instruction for the machine in Appendix C

Figure 2.6 Decoding the instruction 35A7

Figure 2.7 An encoded version of the instructions in Figure 2.2

machine’s instructions categorized into three groupings Machine Language Summary machine instruction machine’s instructions categorized into three groupings the composition of an instruction