01:198:211 Lecture Notes - Lecture 1: Computer Architecture, Memory Hierarchy, Logic Gate

89 views2 pages

Document Summary

Attend lectures: read readings, no cheating, deadlines are firmly enforced. Assembly (x86) programming: hardware, c programming, digital logic, memory hierarchy. Security flaws can result from program interaction with memory: performance. In memory, either data to be operated upon can be stored, or the actual operations. This allows the cpu to pull instructions as well as the data from memory and operate efficiently: basic cpu pipeline is as follows. Fetch: the cpu picks up the instruction from the given memory location, decode, the cpu parses the data gathered. Execute: the operation is executed, and the cpu moves back to fetch, code parsing pipeline, high level languages are generally c++, java, and the like, compiler transforms the high level languages to assembly. The assembler then transforms the assembly code to binary: details of von neumann, cpu is connected to the io bridge by the bus.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents