• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internal Operations

Extracts from this document...

Introduction

Bruce Sloan 9684555 BTEC National Certificate for ICT Practitioners Computer Systems Assignment 1 - Internal Operations 1) Explain why ASCII codes are either 7-bit or 8-bit but are always stored as single byte lengths. Give six examples of ASCII codes, covering alphabetic, numeric, punctuation and control characters. Show their binary and hexadecimal values. ASCII is, strictly, a seven-bit code, meaning it uses the bit patterns representable with seven binary digits (a range of 0 to 127 decimal) to represent character information. At the time ASCII was introduced, many computers dealt with eight-bit groups (bytes or, more specifically, octets) as the smallest unit of information; the eighth bit was commonly used as a parity bit for error checking on communication lines or other device-specific functions. Machines which did not use parity typically set the eighth bit to zero, though some systems such as Prime machines running PRIMOS set the eighth bit of ASCII characters to one. The original ASCII only used 7-binary digits and was referred to as a 7 bit code, also hence the code only extending to 127. Over the evolution of time the code became 8-bit to increase the code to 128 allowing additional characters. They are always stored as single byte lengths due to the system allowing the process this data either way. The 8-bit standards of ASCII are just a further extension or development though the original 7-bit ASCII remains the most common character encodings used today. ...read more.

Middle

left or right until the value of the number is in the range: 1 < n < 2 This is known as normalisation. Since the first digit is now always going to be 1 there is no need to encode this digit. The mantissa only includes the digits after the point and the leading 1 is assumed. The number shown above is -1.1011 0011 01*28 In un-normalised form this is -110110011.01 4) Write a short account of data representation in a computer. Include details of where each format is used and consider any errors likely to occur due to inappropriate use of formats. Most data structures are abstract structures and are implemented by the programmer with a series of assembly language instructions. Many cardinal data types (bits, bit strings, bit slices, binary integers, binary floating point numbers, binary encoded decimals, binary addresses, characters, etc.) are implemented directly in hardware for at least parts of the instruction set. Some processors also implement some data structures in hardware for some instructions - for example, most processors have a few instructions for directly manipulating character strings. An assembly language programmer has to know how the hardware implements these cardinal data types. Some examples: Two basic issues are bit ordering (big endian or little endian) and number of bits (or bytes). The assembly language programmer must also pay attention to word length and optimum (or required) ...read more.

Conclusion

memory location ans = $0852 //defines location to save .ORG start LDA #num1 //the accumulator is loaded with a predefined value STA loc1 //that value is then copied from the accumulator into location in memory LDA #num2 //the accumulator is loaded with another predefined value STA loc2 //that value is then copied from the accumulator into location in memory LDA loc1 //the initial value is fetched from memory and loaded into the accumulator ADC loc2 //the other value is fetched from memory and added to the accumulator STA ans //the end result is then stored into memory .END 8) Extend the scope of your code in Q7 to allow a block of data ( 8 bytes) in memory to be summed and the final sum stored in memory. You must include a flow diagram and comprehensive comments explaining the action of your code. Start = $0800 //sets the start address Number = 8 //sets number to 8 .ORG start main LDX #0 //load X register immediate - 0 LDA table,x //load accumulator indexed - x LDY #number //load Y register with number immediate Again JSR sub1 //jump to subroutine DEY //decrement the Y register BNE again //branch if zero flag clear STA answer //store accumalator Here JMP here //jump to another location sub1 INX //increment the X register ADC table,x //add with carry RTS //return from subroutine Table .DB 5,10,15,20,25,30,35,40 Answer = table+number ?? ?? ?? ?? COMPANY CONFIDENTIAL ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    It starts off with one field and this field separates in to other fields, which separate into others. This structure allows information to be repeated. The only access to this database is at the top and it then moves downwards.

  2. Visual basic

    End If 'looks if the ball is at the bottom of the form If ball.Top > Me.Height Then 'sets lifes to lifes - 1 lifes = lifes - 1 'puts

  1. Data Representation

    It is used for communicating and exchanging data between Computer systems. The power of Unicode is that it enables human communication across languages, cultures and geographic areas. This code is very complex to understand but is a very valuable universal code.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    This operating system features a friendly user interface. The operating system will have everything the previous operating system had but with a couple more features and it works more productively. The Operating system package has been ordered to be sent to us on the 9th January so that everything is

  1. Fetch Decode and Execute

    All these communicational links to ensure that the fetch decode and execute cycle function are controlled by the control unit. Within the control unit there are two special registers (these were mentioned in M2) and they are the programme counter and instruction register.

  2. Smart Card System

    There is a speed penalty associated with using the per-directory configuration files, but that's the trade-off you have to take. Access control for a given directory is controlled by a specific file in the directory with a filename as specified by the "AccessFileName" directive.

  1. Flexible Architectures in Communication Security Application

    As shown in Figure 8, the SBOX instruction eliminates address generation (which takes a full cycle on the baseline machine). This is accomplished by restricting that all SBOX tables be aligned to a 1k byte boundary. SBOX address calculation then simplifies to zero-latency bit concatenation.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    of computer it may not worker on one with a different hardware configuration. There are also high-level and fourth generation program languages which are easier to use as the programming is near English. A low-level language will not be suitable for me considering my experience and time available.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work