Unit 5 Exercise 1.5 Programming Research Paper

Decent Essays
Fig 1.2 Classes of interrupts
Program Generated by some condition that occurs as a results of an instruction execution, such as arithmetic overflow, division by zero, attempt to execute am illegal machine instruction, and reference outside a user's allowed memory space.
Timer Generated by a timer within the processor. This allows the operating system to perform certain functions on a regular basis.
I/O Generated by an I/O controller, to signal normal completion of an operation or to signal a variety of error conditions.
Hardware failure Generated by a failure such as power failure or memory parity error.
Source: William Stallings (Date of access: 16 October 2017)

1.6 Memory Hierarchy

It is a concept that is used to describe different ways in which a computer handles information.
Memory hierarchy can be used to separate storage devices into a hierarchy depending on response time. The hierarchy levels can be distinguished by their capacity, speed and cost.
Fig 1.3 illustrates a typical memory hierarchy levels. As you move down the hierarchy the following happens.
• Decreasing cost per
…show more content…
Cache is also a temporary storage memory. It is closer to the central processing unit and is even faster than the random access memory. Most of the instructions or data that are frequently used by the processor are stored in cache memory.

When a processor uses certain data for the first process, a copy of the instructions is stored in the cache memory. If the processor needs the same instructions for another process, it checks in the cache memory first and if found data is retrieved. This improves the working performance of the

Related Documents

  • Improved Essays

    1.7 III (b) VEGF: VEGF is also known as vascular permeability factor (VPF) is an endothelial cell specific mitogen in in vitro and is the main factor responsible for vasculogenesis and angiogenesis in a variety of in vivo models. The gene transcripts level of VEGF is stimulated at the time of implantation because process of implantation occurs under hypoxic condition. In rodents, VEGF is involved during embryo–endometrium crosstalk by regulating endothelial cell proliferation and vascular permeability of endothelial cells at implantation sites in rodents (Rabbani and Rogers, 2001; Rockwell et al., 2002). The VEGF’s mRNA and protein expression level has been noticed in endometrial stomal, endothelial, and glandular cells during the mid-secretory stage in the human (Charnock-Jones et al., 1993).…

    • 414 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 8 Exercise 1

    • 1124 Words
    • 5 Pages

    // // half_fit.c // Half-Fit // #include #include #include "half_fit.h" #include "type.h" #include "math.h" //unsigned char array[MAX_SIZE] __attribute__ ((section(".ARM.__at_0x10000000"), zero_init)); #define MEMORY 32768 #define BASE_ADDR (void*) 0x10000000 static header_free* buckets[11]; /* START Helper Functions */ // CEIL_32 Function U32 CEIL_32 (U32 value) { // Re-adjust value to round up (or ceil) to nearest multiple of 32 return ((value-1)/32 + 1) * 32; // (e.g. 32->31->0->1->32, 196->195->6->7->224) // ^OPTIMIZE OPTION: USE BITWISE OPERATORS } // Function to calculate required size U32 adjust_size(U32 initial_size) { // Add 4 bytes because of header size U32 newSize =…

    • 1124 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Elisha, for the month of April you scored 7.6 points per hour. Your current yearly average is 7.3 points per hour. The team average for the month of April was 9.2 points per hour and the department average for the same month was 9.2 points per hour. Elisha, you continue to perform well below the department expectations in productivity month-over-month. As stated before this cannot continue.…

    • 407 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Concurrency loss due to IO path critical sections (IPCS) Time lost in waiting queue (WT) to enter a critical section affects an application concurrency (AC), and impedes the application performance from scaling (AC ∝ 1 / WT) if a workload is bursty and highly parallelized. It is apparent that the wait time to enter a critical section is a function of the CS’s size (CSS) and the number of waiting threads (NWT) i.e. WT ∝ CSS * NWT. Furthermore, the work done (IO completed) is proportional to the trips made through the CSSs (i.e. IOs completed ∝ NWT). Therefore, existence of CSSs in IO path, high wait time, and large CSS’s size affects an application concurrency, and demands the measures to minimize their effects.…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Cpus

    • 1840 Words
    • 8 Pages

    There are three other types of cache Hard drive cache Ram cache and processor cache and each of them are used for different purposes. For example processors may want to use cache data so the it can be accessed quickly by the cpu. Most of the time cache is ran in the background so it when it is being used its not even…

    • 1840 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    This could be one of the main reasons why memory/ram is used in most computers. A downside of ram is that it is power hungry because RAM is a type of volatile memory that would lose all its data without constant power(‘’Random-access Memory’’). File storage CD-DVD ROM CD-DVD ROM is the most common way to read data on a disc. DVD and CD ROM are very similar but CD-ROM can only read memory but has a larger memory capacity when compared to DVD ROM.…

    • 1029 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 1 Exercise 1

    • 294 Words
    • 2 Pages

    Exercise 1: GroceryList or PartyList As a user, I need two columns so that I can move what I have from a have columns and know what I sill need. As a user, I need to add items directly to either column so that I can accurately keep track of items. As a user, I need to delete all items from the list so that I can quickly start a new one.…

    • 294 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    · Memory: This is any computer component that has the ability to storing information or data temporary or permanently, e.g. Read And Write Memory (RAM) and Not Volatile Read And Write Memory (NVRAM). · CPU: This is the brain of the computer and is the central process unit, and it received command/instruction from the computer software and sends the instruction to the right hardware to execute the instruction, and also received the feedback from the hardware and forwards it to the software. · Storage: This is the part of the computer where information or data have been kept temporary or permanently.…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As you can see cache memory is a very practical and method in memory management. Cache memory, commonly called cache, can…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Compare and contrast working and reference memory. The difference between these two types of memory are the "retention"(p.311) period necessary to the situation. Working memory is a temporary retention, meaning that that information is only stored long enough to complete a task before being soon discarded.…

    • 261 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Name and describe the different states that a process can exist in at any given time. The different states are as follows new, running, waiting, ready, and terminated. In the new state, the process is created, and then executed in the running 7 waiting state and finally enters…

    • 268 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Memory is the name given to the process of storing and retrieving information. We would be unable to learn without it. Memory helps to process different variations of information, such as pictures or sounds. It allows us to recall what has happened in our past, and lets us make predictions about future events and consequences of actions. Memory is an individual behaviour by which we retain information about events that have happened in the past.…

    • 748 Words
    • 3 Pages
    Improved Essays