• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

John von Neumann

Extracts from this document...

Introduction

John von Neumann Von Neumann, a mathematician designed the architecture model for a CPU. This model was a single storage structure to hold both the set of instructions on how to perform the computation and the data required or generated by the computation. He designed it by treating the instructions in the same way as the data, a stored-program machine can easily change the instructions. In other words the machine is reprogrammable. Von Neumann's archtectre is still used it todays modern CPU'S. The CPU This diagram represents the structure of the Central Processing System. ...read more.

Middle

It also manages the signals from the control bus. Registers This is a form of high-speed memory which is contained inside of the CPU. All data must be represented in a register before it can be processed. Information is stored temporarily in the registers in which text or buffer positions or rectangles can be saved for later use. Buses A bus is a channel or path between the components in a computer. Having a high-speed bus is important. ...read more.

Conclusion

The first connects the CPU and the system memory. This is the fastest bus in the system. The second bus is the slower and it connects other devices, like the hard disk, CD drive, graphics card etc. These slower buses connect to the system bus through a bridge which integrating the data from the other buses to the system bus. RAM Random Access Memory is the place in a computer where the operating system, application programs, and data in current use are kept temporarily so that they can be quickly reached by the computer's processor. The RAM is plugged on to the mother board and the processor accesses the RAM via buses. Kris Littlewood ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Disadvantage Despite being direct, access times are slow because of the limited speed of rotation possible and the relatively crude nature of the read heads. 3.Magnetic hard disk Data is stored in the same way as on a floppy disk.

  2. The Data Management Structure: Components and the data structure

    Flat-file databases Before the advent of data models, organizations stored data in file systems of varying sizes. Databases of this type were often called flat-file databases because they were not linked in any meaningful way to data in other files.

  1. Smart Card System

    damaged in transmit, or it could send a message to the wrong place. It is both more efficient and safer to have TCP compute a separate checksum for the TCP header and data. IP addresses are used to deliver packets of data across a network and have what is termed end-to-end significance.

  2. According to John Searle, strong analytical devices that have Artificial Intelligence can, at most, ...

    A third batch of Chinese symbols and more instructions in English enable you "to correlate elements of this third batch with elements of the first two batches" and instruct you, thereby, "to give back certain sorts of Chinese symbols with certain sorts of shapes in response."

  1. Flexible Architectures in Communication Security Application

    However, its performance is at the expense of flexibility as the hardware cannot be used for other cryptographic processing tasks. In this thesis, we present two hardware/software mixed solutions for efficient cryptographic processing. The first hardware/software mixed approach is to add architectural extensions that streamline cipher kernel processing.

  2. Internal Operations

    * 27 - this is a little more difficult and so have shown my workings: 27 - 128 = 0 27 - 64 = 0 27 - 32 = 0 27 - 16 = 11 = 1 11 - 8 = 3 = 1 3 - 4 = 0 3

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work