SlideShare une entreprise Scribd logo
1  sur  15
WHAT IS
PROCESSER?

Processor which is also called the central processing unit
(CPU)
interprets and carries out the basic instructions that operate
a computer..
• The operating system views each processor
  as a separate processor.
      multi-core processor
     ɷ it is a processor with a single chip
        with two or more separate processor
        cores.
THE COMMON MULTI-CORE PROCESSOR ARE DUAL-
 CORE AND QUAD-CORE.
• A dual-core processor is a chip that contains TWO separate
  processor cores.
• A quad-core processor is a chip with FOUR separate processor
  cores.
When a user starts a program, for example its instruction transfer
from a storage device to memory. Data needed by programs enters
memory from either an input device or a storage device.The control
unit interprets in memory and ALU performs calculation the data in
memory. Resulting information is stored in memory for future access...


                            INPUT DEVICES
                                   ↓ data
                                MEMORY
                                  ↓ information
                               OUT DEVICES
• Processors contain a control unit and an
  arithematic logic unit (ALU).
• These two components work together to
  perform processing operations.
THE CONTROL UNIT
• Is the component of the processor that directs
  and coordinates most of the operations in the
  computer.
• It interprets each instruction issued by a
  program and then initiates the appropriate
  action to carry out instruction.
• There are a few types of internal components that control
  units direct such as:
   a) arithematic logic unit
   b) registers
   c) buses
Parallel processing
• is a method that uses multiple processors simultaneously to
  execute a single program or task
• it divides a single problem into portion so that multiple
  processor work on their assigned portion of the problem at
  the same time.
• These are the few examples of a processor:
MEMORY
• It consists of electronic components that store
  instructions waiting to be executed by the
  processor.
• The role of memory is to store both data and
  programs which is known as the stored
  programs concept.
• Memory stores three basic categories items:
   a) the operating system and other
      system software that controls or
      maintain the computer and its
      devices.
   b) application programs that carry out a
      specific task such as word processing
   c) the data being proccesed by the application
      programs and resulting information.
Bytes and Addressable
            Memory
• A byte (character) is the basic storage unit in
  memory.
• The data are transferred to memory from
  storage devices where the instructions and data
  exsist as bytes.
• Each byte resides temporarily in a location in
  memory that has a address.
Types Of Memory
• There are two types of memory:
   a) volatile
   b) non-volatile
• When the computer's power is turned off
  volatile memory loses its contents.
• Non-volatile, by contrast, does not loses its
  contents when the power is removed from the
  computer.
• Thus, volatile memory is temporary and non-
  volatile memory is permenant.
• RAM is the most common type of volatile
  memory.
• Examples of non-volatile include ROM, flash
  memory, and CMOS.
• These are the few examples of memory:

Contenu connexe

Tendances

Learn about computer hardware and software
Learn about computer hardware and softwareLearn about computer hardware and software
Learn about computer hardware and softwarefarrukh ishaq choudhary
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)AJAL A J
 
Operating system
Operating systemOperating system
Operating systemHaripritha
 
Von Neumann Architecture
Von Neumann Architecture   Von Neumann Architecture
Von Neumann Architecture Lor Ham
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
fundamental of computer-u-1-computer hardware system
fundamental of  computer-u-1-computer hardware systemfundamental of  computer-u-1-computer hardware system
fundamental of computer-u-1-computer hardware systemRai University
 
Chapter 1 com org (student copy)
Chapter 1   com org (student copy)Chapter 1   com org (student copy)
Chapter 1 com org (student copy)Al Sabiaga
 
Computer architecture
Computer architectureComputer architecture
Computer architectureZuhaib Zaroon
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)wardjo
 
5. spooling and buffering
5. spooling and buffering 5. spooling and buffering
5. spooling and buffering myrajendra
 
For students wk4_computer_function_and_interconnection
For students wk4_computer_function_and_interconnectionFor students wk4_computer_function_and_interconnection
For students wk4_computer_function_and_interconnectionlimyamahgoub
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Subhasis Dash
 
Bca i-fundamental of computer-u-3-functions operating systems
Bca  i-fundamental of  computer-u-3-functions operating systemsBca  i-fundamental of  computer-u-3-functions operating systems
Bca i-fundamental of computer-u-3-functions operating systemsRai University
 
L 2 basic computer organization
L 2 basic computer organizationL 2 basic computer organization
L 2 basic computer organizationStubborn sam
 

Tendances (19)

Unit 1
Unit 1Unit 1
Unit 1
 
Learn about computer hardware and software
Learn about computer hardware and softwareLearn about computer hardware and software
Learn about computer hardware and software
 
Register
RegisterRegister
Register
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)
 
Operating system
Operating systemOperating system
Operating system
 
Von Neumann Architecture
Von Neumann Architecture   Von Neumann Architecture
Von Neumann Architecture
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Basic computer architecture
Basic computer architectureBasic computer architecture
Basic computer architecture
 
fundamental of computer-u-1-computer hardware system
fundamental of  computer-u-1-computer hardware systemfundamental of  computer-u-1-computer hardware system
fundamental of computer-u-1-computer hardware system
 
Chapter 1 com org (student copy)
Chapter 1   com org (student copy)Chapter 1   com org (student copy)
Chapter 1 com org (student copy)
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Os ch1
Os ch1Os ch1
Os ch1
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
 
5. spooling and buffering
5. spooling and buffering 5. spooling and buffering
5. spooling and buffering
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
 
For students wk4_computer_function_and_interconnection
For students wk4_computer_function_and_interconnectionFor students wk4_computer_function_and_interconnection
For students wk4_computer_function_and_interconnection
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1)
 
Bca i-fundamental of computer-u-3-functions operating systems
Bca  i-fundamental of  computer-u-3-functions operating systemsBca  i-fundamental of  computer-u-3-functions operating systems
Bca i-fundamental of computer-u-3-functions operating systems
 
L 2 basic computer organization
L 2 basic computer organizationL 2 basic computer organization
L 2 basic computer organization
 

Similaire à Power Supply

CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureKarthikeyan Dhayalan
 
Intro to Computing Lec 1.pptx
Intro to Computing Lec 1.pptxIntro to Computing Lec 1.pptx
Intro to Computing Lec 1.pptxFalakNiaz15
 
2 the computer system hardware
2  the computer system hardware2  the computer system hardware
2 the computer system hardwarearslanzafar13162
 
computer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfcomputer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfshubhangisonawane6
 
Computer Architecture and Organization.pptx
Computer Architecture and Organization.pptxComputer Architecture and Organization.pptx
Computer Architecture and Organization.pptxLearnersCoach
 
Computer Organization and Architecture.pptx
Computer Organization and Architecture.pptxComputer Organization and Architecture.pptx
Computer Organization and Architecture.pptxAshokRachapalli1
 
fundamentals of digital communication unit 2 notes.pdf
fundamentals of digital communication  unit 2 notes.pdffundamentals of digital communication  unit 2 notes.pdf
fundamentals of digital communication unit 2 notes.pdfshubhangisonawane6
 
BAIT1003 Chapter 2
BAIT1003 Chapter 2BAIT1003 Chapter 2
BAIT1003 Chapter 2limsh
 
Memory and Processor for class presentation.pptx
Memory and Processor for class presentation.pptxMemory and Processor for class presentation.pptx
Memory and Processor for class presentation.pptxwajihaabbas95
 
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptx
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptxVON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptx
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptxSanketGangode
 
3. basic organization of a computer
3. basic organization of a computer3. basic organization of a computer
3. basic organization of a computerSHIKHA GAUTAM
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxakhilagajjala
 
Fundamentals of computer Part 1
Fundamentals of computer Part 1Fundamentals of computer Part 1
Fundamentals of computer Part 1SURBHI SAROHA
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptxRbiGradeB
 
Introduction to Digital Forensics
Introduction to Digital ForensicsIntroduction to Digital Forensics
Introduction to Digital ForensicsDon Caeiro
 

Similaire à Power Supply (20)

CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU Architecture
 
Intro to Computing Lec 1.pptx
Intro to Computing Lec 1.pptxIntro to Computing Lec 1.pptx
Intro to Computing Lec 1.pptx
 
2 the computer system hardware
2  the computer system hardware2  the computer system hardware
2 the computer system hardware
 
computer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfcomputer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdf
 
Computer Architecture and Organization.pptx
Computer Architecture and Organization.pptxComputer Architecture and Organization.pptx
Computer Architecture and Organization.pptx
 
Computer Organization and Architecture.pptx
Computer Organization and Architecture.pptxComputer Organization and Architecture.pptx
Computer Organization and Architecture.pptx
 
fundamentals of digital communication unit 2 notes.pdf
fundamentals of digital communication  unit 2 notes.pdffundamentals of digital communication  unit 2 notes.pdf
fundamentals of digital communication unit 2 notes.pdf
 
BAIT1003 Chapter 2
BAIT1003 Chapter 2BAIT1003 Chapter 2
BAIT1003 Chapter 2
 
Week 01.pdf
Week 01.pdfWeek 01.pdf
Week 01.pdf
 
Memory and Processor for class presentation.pptx
Memory and Processor for class presentation.pptxMemory and Processor for class presentation.pptx
Memory and Processor for class presentation.pptx
 
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptx
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptxVON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptx
VON_NEUMANN_ARCHITECTURE_PPT_COAA final.pptx
 
3. basic organization of a computer
3. basic organization of a computer3. basic organization of a computer
3. basic organization of a computer
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptx
 
I tf
I tfI tf
I tf
 
Group No.2-WPS Office.pptx
Group No.2-WPS Office.pptxGroup No.2-WPS Office.pptx
Group No.2-WPS Office.pptx
 
Chapter01 (1).ppt
Chapter01 (1).pptChapter01 (1).ppt
Chapter01 (1).ppt
 
Fundamentals of computer Part 1
Fundamentals of computer Part 1Fundamentals of computer Part 1
Fundamentals of computer Part 1
 
pre phd class 1.pptx
pre phd class 1.pptxpre phd class 1.pptx
pre phd class 1.pptx
 
Introduction to Digital Forensics
Introduction to Digital ForensicsIntroduction to Digital Forensics
Introduction to Digital Forensics
 

Plus de chrispaul8676 (15)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
data representation
data representationdata representation
data representation
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software theft
Software theftSoftware theft
Software theft
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Power Supply

  • 1. WHAT IS PROCESSER? Processor which is also called the central processing unit (CPU) interprets and carries out the basic instructions that operate a computer..
  • 2. • The operating system views each processor as a separate processor. multi-core processor ɷ it is a processor with a single chip with two or more separate processor cores.
  • 3. THE COMMON MULTI-CORE PROCESSOR ARE DUAL- CORE AND QUAD-CORE. • A dual-core processor is a chip that contains TWO separate processor cores. • A quad-core processor is a chip with FOUR separate processor cores.
  • 4. When a user starts a program, for example its instruction transfer from a storage device to memory. Data needed by programs enters memory from either an input device or a storage device.The control unit interprets in memory and ALU performs calculation the data in memory. Resulting information is stored in memory for future access... INPUT DEVICES ↓ data MEMORY ↓ information OUT DEVICES
  • 5. • Processors contain a control unit and an arithematic logic unit (ALU). • These two components work together to perform processing operations.
  • 6. THE CONTROL UNIT • Is the component of the processor that directs and coordinates most of the operations in the computer. • It interprets each instruction issued by a program and then initiates the appropriate action to carry out instruction.
  • 7. • There are a few types of internal components that control units direct such as: a) arithematic logic unit b) registers c) buses
  • 8. Parallel processing • is a method that uses multiple processors simultaneously to execute a single program or task • it divides a single problem into portion so that multiple processor work on their assigned portion of the problem at the same time.
  • 9. • These are the few examples of a processor:
  • 10. MEMORY • It consists of electronic components that store instructions waiting to be executed by the processor. • The role of memory is to store both data and programs which is known as the stored programs concept.
  • 11. • Memory stores three basic categories items: a) the operating system and other system software that controls or maintain the computer and its devices. b) application programs that carry out a specific task such as word processing c) the data being proccesed by the application programs and resulting information.
  • 12. Bytes and Addressable Memory • A byte (character) is the basic storage unit in memory. • The data are transferred to memory from storage devices where the instructions and data exsist as bytes. • Each byte resides temporarily in a location in memory that has a address.
  • 13. Types Of Memory • There are two types of memory: a) volatile b) non-volatile
  • 14. • When the computer's power is turned off volatile memory loses its contents. • Non-volatile, by contrast, does not loses its contents when the power is removed from the computer. • Thus, volatile memory is temporary and non- volatile memory is permenant. • RAM is the most common type of volatile memory.
  • 15. • Examples of non-volatile include ROM, flash memory, and CMOS. • These are the few examples of memory: