• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internal Operations

Extracts from this document...


Bruce Sloan 9684555 BTEC National Certificate for ICT Practitioners Computer Systems Assignment 1 - Internal Operations 1) Explain why ASCII codes are either 7-bit or 8-bit but are always stored as single byte lengths. Give six examples of ASCII codes, covering alphabetic, numeric, punctuation and control characters. Show their binary and hexadecimal values. ASCII is, strictly, a seven-bit code, meaning it uses the bit patterns representable with seven binary digits (a range of 0 to 127 decimal) to represent character information. At the time ASCII was introduced, many computers dealt with eight-bit groups (bytes or, more specifically, octets) as the smallest unit of information; the eighth bit was commonly used as a parity bit for error checking on communication lines or other device-specific functions. Machines which did not use parity typically set the eighth bit to zero, though some systems such as Prime machines running PRIMOS set the eighth bit of ASCII characters to one. The original ASCII only used 7-binary digits and was referred to as a 7 bit code, also hence the code only extending to 127. Over the evolution of time the code became 8-bit to increase the code to 128 allowing additional characters. They are always stored as single byte lengths due to the system allowing the process this data either way. The 8-bit standards of ASCII are just a further extension or development though the original 7-bit ASCII remains the most common character encodings used today. ...read more.


left or right until the value of the number is in the range: 1 < n < 2 This is known as normalisation. Since the first digit is now always going to be 1 there is no need to encode this digit. The mantissa only includes the digits after the point and the leading 1 is assumed. The number shown above is -1.1011 0011 01*28 In un-normalised form this is -110110011.01 4) Write a short account of data representation in a computer. Include details of where each format is used and consider any errors likely to occur due to inappropriate use of formats. Most data structures are abstract structures and are implemented by the programmer with a series of assembly language instructions. Many cardinal data types (bits, bit strings, bit slices, binary integers, binary floating point numbers, binary encoded decimals, binary addresses, characters, etc.) are implemented directly in hardware for at least parts of the instruction set. Some processors also implement some data structures in hardware for some instructions - for example, most processors have a few instructions for directly manipulating character strings. An assembly language programmer has to know how the hardware implements these cardinal data types. Some examples: Two basic issues are bit ordering (big endian or little endian) and number of bits (or bytes). The assembly language programmer must also pay attention to word length and optimum (or required) ...read more.


memory location ans = $0852 //defines location to save .ORG start LDA #num1 //the accumulator is loaded with a predefined value STA loc1 //that value is then copied from the accumulator into location in memory LDA #num2 //the accumulator is loaded with another predefined value STA loc2 //that value is then copied from the accumulator into location in memory LDA loc1 //the initial value is fetched from memory and loaded into the accumulator ADC loc2 //the other value is fetched from memory and added to the accumulator STA ans //the end result is then stored into memory .END 8) Extend the scope of your code in Q7 to allow a block of data ( 8 bytes) in memory to be summed and the final sum stored in memory. You must include a flow diagram and comprehensive comments explaining the action of your code. Start = $0800 //sets the start address Number = 8 //sets number to 8 .ORG start main LDX #0 //load X register immediate - 0 LDA table,x //load accumulator indexed - x LDY #number //load Y register with number immediate Again JSR sub1 //jump to subroutine DEY //decrement the Y register BNE again //branch if zero flag clear STA answer //store accumalator Here JMP here //jump to another location sub1 INX //increment the X register ADC table,x //add with carry RTS //return from subroutine Table .DB 5,10,15,20,25,30,35,40 Answer = table+number ?? ?? ?? ?? COMPANY CONFIDENTIAL ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Spreadsheets are mainly used to store statistical values and data but can be used for text based information also. Spreadsheets are good to use in a supermarket rather than other tools due to many reasons which the other tools cannot do.

  2. Visual basic

    End If 'looks if the ball is at the bottom of the form If ball.Top > Me.Height Then 'sets lifes to lifes - 1 lifes = lifes - 1 'puts

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The differences being that the hard disk is made of a rigid material rather than a floppy plastic, and it is contained in a sealed unit. Advantage These differences mean that the hard disk can rotate faster, the heads can get closer to the surface meaning that the storage density

  2. Programming Techniques

    to a string value, it expects a numerical value and returns a string value Ctod converts a character to date, it expects character value and returns a date value Program Translation When a human being writes a computer program it is important for them that they can use a language which is easy to understand.

  1. Flexible Architectures in Communication Security Application

    Section 5.6 Physical Design Characteristics Table 3 shows the timing, area, and power consumption results for various configurations. A 4-wide CryptoManiac with instruction combining has an estimated clock cycle of 2.78ns, yielding a CryptoManiac processor that runs at 360MHz! The same configuration has an area of 1.39mm X 1.39mm (1.93mm2),

  2. This technical report will look at various different memory devices and how they are ...

    is reprogrammed on a regular basis while the computer is still in use. Random Access Memory Memory comes in two types, one of which has just been looked at (i.e. ROM and the different types of ROM) and other which is known as RAM (Random-Access Memory).

  1. Computer Aided Design Package

    total costs for the low ranged costs, mid ranged costs and the high ranged costs, all of these include the computers costs, plotters costs, graphics tablet cost, networking costs and the CAD software which it will be running. Low band Mid band High band Price �5003.28 �6987.37 �9162.54 P5 There

  2. AS ICT Corsework - Mr Brookes K-Fit Ltd

    I expect that each of my selected browsers will load my website fine and all images and text will load correctly. Test One - Hyperlinks This is what I am testing: Do the product links on the website all work correctly.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work