Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
By means of suitable diagram, show how a CPU chip is interconnected to an I/O and a main memory in a simple Von Newman computer design bus system
+1
vote
1.3k
views
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+2
votes
answered
Aug 27, 2019
by
anonymous
selected
Oct 10, 2019
by
(user.guest)
Best answer
There are two standard diagrams for this,
Diagram 1
Diagram 2
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
1.1k
views
By means of a suitable diagram, show Flynn’s classifications of computer architectures for a Single Instruction Stream, Multiple Data stream (SIMD) with Shared and without a Shared memory.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
2.5k
views
By means of a clearly labeled Memory Hierarchy diagram, discuss the pro and cons of the use of the various memory segments in the design and build of a personal computer on a Intel based architecture.
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
623
views
The RAM is a temporal storage area in the computer system that usually contains the data that are being processed by the CPU. Briefly describe how the CPU and the RAM interacts to carry out their operation.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.4k
views
Describe briefly by means of a diagram the main difference between multiprocessor and multicomputer design architecture and state two uses of each
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
0
votes
0
answers
348
views
What actions can be taken to avoid accessing the main memory which is not updated by the I/O device
asked
Apr 20, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
607
views
Explain what is meant by the term or phenomenon ‘Register naming’ and show by a sequence of program outline how this is achieved in a computer architecture
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
0
votes
0
answers
431
views
TWO (2) main problem dealing with I/O devices to ensure the performance of the CPU is remaining high
asked
Feb 1, 2021
in
Computer Architecture
by
anonymous
0
votes
0
answers
200
views
Refer to the following block diagram of a computer system, considering yourself as an architect of this system a. Identify the main functions of a computer?
asked
May 31, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
95
views
What are some of the ways in which data may be transferred to and from the CPU and I/O devices
asked
May 13
in
Computer Architecture
by
(user.guest)
0
votes
1
answer
536
views
What is the main function of the CPU in a computer system
asked
Nov 29, 2021
in
Computational Tools
by
(user.guest)
+2
votes
1
answer
2.0k
views
Why is there a trend toward allocating an increasing fraction of chip area to cache memory?
asked
Jan 26, 2020
in
Computer Architecture
by
anonymous
0
votes
0
answers
611
views
List and explain the supporting chips (nowadays, it is called chipset) of the Intel 8085 CPU for its I/O and interfacing with I/O devices.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
0
votes
0
answers
544
views
A microprocessor has an on - chip 2 - way set associative cache with a total capacity of 8 kByte. Each line in cache can store sixteen 8 - bit words. It has a total addressable space of 16 MBytes. Consider the following CPU instruction: Load AB1234h,
asked
May 29, 2021
in
Computer Architecture
by
anonymous
0
votes
1
answer
395
views
What does a model in a software engineering can be defined as an abstraction of a system that has no longer exists, an existing system and future system to be built means?
asked
Mar 30, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
979
views
Explain what is meant by a ‘compensation action’ and, using an example, show why these actions may have to be included in workflows.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
510
views
Explain with the aid of a diagram, the packaging (the chip or IC) of the Intel 8085 CPU.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
+3
votes
1
answer
2.1k
views
You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker.
asked
Nov 23, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.8k
views
For an associative cache, a main memory address is viewed as consisting of two fields. List and define the two fields.
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
+1
vote
0
answers
402
views
A transistor in an IC chip was 2 microns in size, according to Moore's law how large would the transistor be in 2 years
asked
Mar 8, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
468
views
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
887
views
What is the general relationship among access time, memory cost, and capacity?(Using the concepts of memories in computer system)
asked
Oct 22, 2021
in
Computer Architecture
by
(user.guest)
+1
vote
0
answers
470
views
The Intel 8085 CPU is one of the many CPUs by Intel. Compare the Intel 8085 CPU with (a) Zilog Z80 CPU (b) Motorolla 6800 CPU in term of architecture, number of instructions, addressing modes and the supporting chips.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
736
views
Section 15.4 includes a C program that calculates the greatest common divisor of two integers. Describe the algorithm in words and show how the program does implement the Euclid algorithm approach to calculating the greatest common divisor.
asked
May 16, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
1.5k
views
Is it necessary for the pages of a process in main memory to be in sequential order?
asked
Jan 2, 2020
in
Computer Architecture
by
anonymous
+2
votes
1
answer
1.7k
views
Is it necessary for all of the pages of a process to be in main memory while the process is executing?
asked
Jan 2, 2020
in
Computer Architecture
by
anonymous
0
votes
1
answer
103
views
What are the two main roles played by the CPU in controlling the working of the computer
asked
Dec 25, 2021
in
Computational Tools
by
(user.guest)
+1
vote
1
answer
463
views
What's the need for the advent of the multiprocessor design in computer architecture and explain briefly what were the main basis for this shift from the single core development
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
3.1k
views
What is the difference between memory-mapped I/O and isolated I/O?
asked
Jan 2, 2020
in
Computer Architecture
by
anonymous
0
votes
0
answers
446
views
Explain the disadvantages of interrupt driven I/O during the data transfer between memory and I/O devices
asked
Feb 1, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
329
views
What is meant by the term 'a large window of execution is needed’ with reference to superscalar design and processes
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
+1
vote
0
answers
669
views
You have been asked to develop a system that will help with planning large-scale event and parties, using an activity diagram model the process context for such a system that shows the activities involved in planning a party
asked
Nov 10, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.8k
views
Discuss the notion of stored-program architecture. How Von Neumann's architecture used this breakthrough idea in designing computer systems?
asked
Sep 22, 2020
in
Computer Architecture
by
(user.guest)
+1
vote
0
answers
74
views
How many 8-bit I/O control module registers do we need for status reading and control of each device?
asked
May 12
in
Computer Architecture
by
anonymous
+2
votes
1
answer
1.8k
views
If a process may be dynamically assigned to different locations in main memory, what is the implication for the addressing mechanism?
asked
Jan 2, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
192
views
In simple terms define a computer system
asked
Feb 14
in
Computer Architecture
by
(user.guest)
+2
votes
1
answer
10.3k
views
Discuss the major functions of the computer and explain in your own words, how these functions are carried out by the computer.
asked
Jul 28, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
3.7k
views
Name the types of data dependencies that could be identified within the superscalar architecture and discuss their impact on computer architecture development by giving an example in each case.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
166
views
A request to fill the general purpose register with the content of the main memory cell is known as what?
asked
Dec 18, 2021
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
339
views
What do we find in a DMA module that is not found in I/O module?
asked
Mar 15, 2021
in
Computer Architecture
by
anonymous
0
votes
0
answers
435
views
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
–1
vote
1
answer
691
views
Duplicate: For a set-associative cache, a main memory address is viewed as consisting of three fields. List and define the three fields.
asked
May 10, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
3.0k
views
For a set-associative cache, a main memory address is viewed as consisting of three fields. List and define the three fields.
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
4.3k
views
For a direct-mapped cache, a main memory address is viewed as consisting of three fields. List and define the three fields.
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
+1
vote
0
answers
854
views
A software system will be built to allow drones to autonomously herd cattle in farms. These drones can be remotely controlled by human operators. Explain how multiple architectural patterns can fit together to help build this kind of system.
asked
Jul 10, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
270
views
Verification and Validation (V&V) is intended to show that a system both conforms to its specification and that it meets the expectations of the system customer. Diagrammatically explain the approaches of the testing.
asked
Mar 1, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.1k
views
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
416
views
A manager decides to use the reports of program inspections as an input to the staff appraisal process. These reports show who made and who discovered program errors. Is this ethical managerial behavior?
asked
Apr 16, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.1k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...