We are now starting to get more into the hardware part of the computer. However, this is all suppose to be abstract thinking, we are trying to think how a computer is built so we can put all of this code together to run in the simulator. Other then talking about processors and registers, this class is once just a work on stuff kind of day. So i tried to help with some of the code in class but we didnt get to far because we made paper airplanes. In HPC i cant seem to make the shell script use the source command properly. I dont know what im doing wrong and i feel like it should work. If i cant get this soon, im just going to stop and do some simple program for a project.
This week is spring break so yea obviously no classes. I will not lie, no work is being done on any of my classes because mainly its break and the fact im covering shifts for people because they took off of work. However i have tried messing with a shell script for awhile and i think i have an idea on how to fix some of my logic issues but i do not know if it will work because of reasons. But yea other then that, woo spring break.
Its a pretty easy week of class. Still doing independent study type deal. Everyone is working on their own thing. I should really be working on this opus because i procrastinated horribly on it and i feel if i dont get work done on it i will end up paying for it. I dont know i guess we will find out when the time comes huh? Either way, i have pretty much gave up on the script because i suck. I need to mess with some easier shell code before i tackle a monster like that, i just need practice is all.
EOCE has been announced for the classes, woo! I know what i will be working on. I know i need to get this opus done but its hard to focus on getting work done in this class without any sort of structure. Like i want to learn, i want to do work and stuff but with the lack of structure and the whole do it yourself attitude does not work for me. I will put everything off till the last minute and i know i will for a fact. But the EOCE's dont look too bad, it shouldnt take me long to do but we will see once the time comes wont we :)
Back to the registers we have different special registers that can be used. Data stored in the stack frame may sometimes be accessed directly via the stack pointer register (which indicates the current top of the stack). However, as the stack pointer is variable during the activation of the routine, memory locations within the stack frame are more typically accessed via a separate register which makes relative addressing simpler and also enables dynamic allocation mechanisms.
The next thing is a program counter. It is also called a instruction pointer and it basically points to where the program is currently at. A flag.status can be used to stop an instruction or the program or something. The flag gives the option of other paths within the data.
An index register in a computer's CPU is a processor register used for modifying operand addresses during the run of a program, typically for doing vector/array operations. This register is there to keep the process flowing by telling where to go next and keeping all the programs running smoothly.
Clear_accumulator Load_index 400,index2 //load 4*array size into index register 2 (index2) loop_start : Add_word_to_accumulator array_start,index2 //Add to AC the word at the address (array_start + index2) Branch_and_decrement_if_index_not_zero loop_start,4,index2 //loop decrementing by 4 until index resister is zero
RISC: Reduced instruction set computing is a CPU design strategy based on the insight that simplified instructions can provide higher performance if this simplicity enables much faster execution of each instruction.
CISC: A complex instruction set computer is a computer where single instructions can execute several low-level operations (such as a load from memory, an arithmetic operation, and a memory store) and/or are capable of multi-step operations or addressing modes within single instructions.
Data Movement: This is an instruction that moves data from one location to another location. It could be in memory or register.
Address Movement: This is an instruction that moves a given address from one location to another. Same as before the locations here can also be a memory location or registers.
Data Conversion: This is an instruction that changes the data type of the data being dealt with.
Bit Manipulation: This is an instruction that changes individual bits. Setting a bit sets the value to 1and opposite where clearing a bit sets it to 0.
A subroutine is a smaller piece of code inside a bigger code, usually remaining independent to itself. It performs a specific task that is been given and the main program needs it, it will call it to use its functionality. Its essentially a function that performs some task outside the main, does what it needs, returns a certain variable with a particular datatype that is needed and go to where it has been called to the main can use it effectively.
here is what a subroutine looks like:
char function3(int number) { char selection[] = {'S','M','T','W','T','F','S'}; return selection[number]; }
Data is represented in a number of ways. Big endian is used to show how bits are stored and with this particularly it loads in big end value first. Little endian is very similar its just loads the little value first. so BE (0x1234) and LE is (0x4321). Size is the size of data. Like a bit is the smallest size we have, byte is the size of 8 bits. Integer is easy, its 1 2 3. A floating point is a data type to give to some data. ASCII is the table to show ASCII values in binary, Hex, octal and decimal to the letters and symbols we see.
Sign representation just encodes negative numbers in to the binary system. One's Complement just flips the bit value in the binary number. Its like a NOT logic being used. Twos complement however does do the same thing but adds a 1 to the numbers after they have been flip. This allows negative numbers to reside with positive numbers.
Linking is the act of bringing together all the different objects brought about the compile process. Object code is what is given when we compile the source code that we give to the compiler. Machine code is the lowest level language and is what is read at the pre processing stage, the 1's and 0's
State the course objective
In your own words, define what that objective entails.
State the method you will use for measuring successful academic/intellectual achievement of this objective.
Follow your method and obtain a measurement. Document the results here.
Reflect upon your results of the measurement to ascertain your achievement of the particular course objective.
Lab operations is where you are the manager of operations at hand. It can be seen in many setting, in a factory or in a office watching over a program. The operations at hand are there to make everything more efficient and you want it to run smooth. They are there to make projects smaller and flow easier, develop faster, and just improve overall.
This is basically the person of the computer fixing up their system. If a piece of hardware breaks, you have to install a new piece or fix the current one. Then if everything is running well, you want to do a routine of cleaning and check ups to make sure all hardware is running tip top shape.
Computer data logging is the process of recording events, with an automated computer program, in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems. These are very helpful in the aid of certain systems that rarely get touched by a user, like a server program.
This picture kind of shows how it works. Its taking the data from each point to see if everything is running the way it should:
This refers to the accessibility of a computer system to all people, regardless of disability or severity of impairment. It is largely a software concern; when software, hardware, or a combination of hardware and software, is used to enable use of a computer by a person with a disability or impairment, this is known as Assistive Technology.
When upgrading its quite obvious you are going from one state, to a state that is clearly a more improved state. A computer is built so it can upgrade to a certain point and improved its performance. Like RAM, we all start off at a set amount but it can always be upgraded to get the max amount the computer itself can hold.
The intelligence of machines and the branch of computer science that aims to create it. An intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. In a nutshell it is basically a humanoid, half robot, half person. It should be able to “think” and do what we do, but that is still kind of far out of reach for us.
There are many types of different hackers. You have the ones who simply who like to make the most out of what they have, customize and innovate their current product. Or someone who is really into free software and knows how to get it. However most come to know that it is a person who can break through security.It means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks. They are in a way technically a cracker, they dont break through anything, just simply find a way to jump over security. Hacking is not really a correct term however it is generally used to describe people who even just know how to program.
Just like internal security, it is ways to protect your system but this time its from the outside. Here you dont need to worry so much about viruses but more of people on the outside. You have to watch for your “hackers” that may know your password and get in. Or maybe they would use a keylogger and break into your account through that. Either way, you must keep strong passwords and change it often to prevent people. Another to be done is to not give out any info at all. Not even your best friend, keep your info to yourself. Just keep things a secret and never let someone get the upper hand. And if you want to get crazy, start setting up cameras, motion sensors, automatic lights. Maybe not for your computer but for an external security sense, maybe you will use it for your room or house in general. Either way, security is both important outside and in.
State the course objective
In your own words, define what that objective entails.
State the method you will use for measuring successful academic/intellectual achievement of this objective.
Follow your method and obtain a measurement. Document the results here.
Reflect upon your results of the measurement to ascertain your achievement of the particular course objective.
Perform the following steps:
Whose existing experiment are you going to retest? Provide the URL, note the author, and restate their question.
Evaluate their resources and commentary. Answer the following questions:
State their experiment's hypothesis. Answer the following questions:
Follow the steps given to recreate the original experiment. Answer the following questions:
Publish the data you have gained from your performing of the experiment here.
Answer the following:
Answer the following:
Perform the following steps:
Whose existing experiment are you going to retest? Provide the URL, note the author, and restate their question.
Evaluate their resources and commentary. Answer the following questions:
State their experiment's hypothesis. Answer the following questions:
Follow the steps given to recreate the original experiment. Answer the following questions:
Publish the data you have gained from your performing of the experiment here.
Answer the following:
Answer the following:
Perform the following steps:
Whose existing experiment are you going to retest? Provide the URL, note the author, and restate their question.
Evaluate their resources and commentary. Answer the following questions:
State their experiment's hypothesis. Answer the following questions:
Follow the steps given to recreate the original experiment. Answer the following questions:
Publish the data you have gained from your performing of the experiment here.
Answer the following:
Answer the following:
What is the question you'd like to pose for experimentation? State it here.
Collect information and resources (such as URLs of web resources), and comment on knowledge obtained that you think will provide useful background information to aid in performing the experiment.
Based on what you've read with respect to your original posed question, what do you think will be the result of your experiment (ie an educated guess based on the facts known). This is done before actually performing the experiment.
State your rationale.
How are you going to test your hypothesis? What is the structure of your experiment?
Perform your experiment, and collect/document the results here.
Based on the data collected:
What can you ascertain based on the experiment performed and data collected? Document your findings here; make a statement as to any discoveries you've made.
What is the question you'd like to pose for experimentation? State it here.
Collect information and resources (such as URLs of web resources), and comment on knowledge obtained that you think will provide useful background information to aid in performing the experiment.
Based on what you've read with respect to your original posed question, what do you think will be the result of your experiment (ie an educated guess based on the facts known). This is done before actually performing the experiment.
State your rationale.
How are you going to test your hypothesis? What is the structure of your experiment?
Perform your experiment, and collect/document the results here.
Based on the data collected:
What can you ascertain based on the experiment performed and data collected? Document your findings here; make a statement as to any discoveries you've made.
Perform the following steps:
Whose existing experiment are you going to retest? Provide the URL, note the author, and restate their question.
Evaluate their resources and commentary. Answer the following questions:
State their experiment's hypothesis. Answer the following questions:
Follow the steps given to recreate the original experiment. Answer the following questions:
Publish the data you have gained from your performing of the experiment here.
Answer the following:
Answer the following: