The objective of this lab is to be able to understand how the CPU functions work, as well as understanding machine and assembly language.
Results:
What I found out is that after doing the lab is that there are three cycles that the CPU goes through in order for the program to be executed. I was able to come up with small programs for 2a and 3b that will execute according to the instructions given in the lab, which is shown below.
Conclusions:
I thought this lab was really awesome because I was able to construct a machine language program in binary code, as well as being able to put together a short assembly language program. What I have implemented from this lab is that the Central Processing Unit (CPU) is able to fetch, decode, and execute
…show more content…
1 - Explain the cycles that CPU goes through in the animation of Lecture 1:
There are three cycles that the CPU goes through in the animation of Lecture 1:
• Fetch Cycle: CPU reads an instruction from the memory
• Decode Cycle: CPU breaks the patterns into two parts (first three bits are place in the OPR, while the last 5 bits are place in the ADDR)
• Execute Cycle: CPU performs the instructions
IV. 2.a - Write the machine language program (binary code).
10010100
00010101
00010110
00010111
00011000
10111001
11100000
IV. 2.b - Write the assembly language program.
LOAD 20 //Loads the present value located at address 20 for A
ADD 21 //Adds the content at address 21 to A
ADD 22 //Adds the content at address 22 to A
ADD 23 //Adds the content at address 23 to A
ADD 24 //Adds the content at address 24 to A
STORE 25 //Stores the values
HALT //The end of the program
IV. 3.a - Write the assembly language program.
Start Ent 1:
D1 A : 5
D2 B : 6
D3 C : 7
Ent 1: MOV R1, A; //Content of A moves into R1 MOV R2, B; //Content of B moves into R2 MOV R3, C; //Content of C moves into R3
ADD R1, #4; //Adding the value of 4 to R1 ADD R2, #4; //Adding the value of 4 to
The objective of this lab was to observe the behavior of a capacitor while charging through a resistor. Overall, the objective of the lab was achieved since an exponential curve was obtained from a charging capacitor.
The following results helped obtain the haplogroup that in which the sequence of mtDNA would identify. The PCR reaction worked, and this can be determined by looking at the agarose gel in figure 1. If the PCR reaction was successful, than a band should appear around 550bp. Individual AC displays a band around 550bp, this means the PCR reaction was successful. The band for individual AC, depicts a low concentration of product, because the band faint. After the purification process the concentration, A260/280 ratio, and A260/A230 ratio were determined by using the nanodrop. The concentration of mtDNA in the product was 60.9 ng/uL. The ratio for A260/280 was 1.79 and the ratio for A260/230 was 0.77. The A260 and 280 are a spectrometer measurement that measure absorbance at wavelengths of
The objective of the lab was to program a vehicle to continuously drive in a one meter square. The square was to be completed in less than 20 seconds, and only the wheel encoder could be used to navigate the vehicle. All of this was done by using the Arduino software tool and the Redbot library to create a program that would satisfy the given lab requirements.
In quadrants 1 and 2 how the amount and constituents of the fingerprint residue on the substrate affects the fingerprint image, is determined. In quadrant 1, excess sebum and moisture is first removed from the finger tips with the help of a clean cloth. In quadrant 2, fingertip is first wiped around the nose or forehead to create excess sebum. Quadrant 3 and 4 were used to compare the details between untreated and dusted fingerprint residues.
energy ($\omega$). Solid lines are CRPA cross sections and dashed lines are HF cross sections.
To calculate the effective diameter of the particles, we use Equation 1 provided below. To determine the effective diameter of the particles, we needed to have the hydrometer readings and temperature for each time taken, as well as using the Coefficient of temperature adjustment table provided in Appendix 3 and the Hydrometer 152H length readings in Appendix 4. To able to determine the Percent Finer for Hydrometer, we use Equation 2 provided below as well as Equation 3 for the Dry Weight of Soil provided below. For Equation 2, we also need the Specific Gravity correction for percent finer table to be able to solve Equation 2. The Specific Gravity correction for percent finer table is provided in Appendix 5. Furthermore, to determine the total
Sequential I/Os offer good RAID reads and writes and also preferred even for large writes. For the database and standard files stored on the servers, the random I/O is preferred with an equal disk time span servicing of all of the I/O requests. For a single application, the RAID 0 with more disks are preferred. For the multiple applications, files might be performed either on RAID 1 or RAID 10. Finally, RAID 5 might receive some of the updates for workloads.
We found the density of the unknown object #6 to be 5.9(g/mL). We then use the table to identify the metal, and the result is that the name of the metal is zinc. Since the density of zinc is 7.14 and that is the closes number to our density, we determine that our unknown object is zinc. Our average density for the unknown liquid #5 is .779(g/mL). The closes density of a known liquid on the table is .792(g/mL), so we concluded that our liquid #5 is cyclohexane which has a density of
The objective of this lab is to learn how to use the Tutor TIMS software to build and analyze a communication system. This lab required us to use Audio Oscilloscope, Adder and Tuneable LPF in order to get the required frequency signals.
You are in charge of the security of information in a research lab. Most of the information is stored in electronic format on the LAN. The researchers can also access these files from their homes. The computers in the lab are also connected to the Internet. The current access is provided to Internet via a combination router-firewall. The entire network resides behind this single firewall-router configuration. It is quite important to maintain the confidentiality of the information, although the lab has limited funds allocated for security. There are 8 workers that use the network connections.
In this lab, many more options were explored with Windows servers. The topics covered were Group Policies and Password Settings Objects. Both of these features of Windows Active Directory allow for very granular settings to be set across the network. These include a wide range of settings that one most likely would not even think of. I have personally worked with both Active Directory and Group Policies quite extensively so neither of these were new topics for me to learn. However, I had never worked with Password Setting Objects before so that was a learning experience. All of these features are useful in any enterprise production network and are highly valuable skills to have.
First let us take a look at computer programming. This element takes on different program designs created by engineers and uses one of several different programming languages to write executable code that computers can read. Programming is the source for
While Loop is used to execute the same code again and again until a stop condition is met.
For the cycle time, it will be reduced since the value of T0 is less (4 versus 5) and the
where ‘C’ is the number of cycles an instruction takes to execute and ‘F’ is the