Computer Architecture: Components and Types

The Architecture of a Computer

Computer architecture encompasses all component parts, their function, and the communication between those parts that allow them to work together in a coordinated manner.

Solution Background: Von Neumann Architecture

In the Von Neumann architecture, the program is stored in memory along with the data. The computer reads data from memory and interprets it as either a program instruction or data. Having a single bus makes the response speed slower, as the system cannot

Read More

Binary Numbers and Floating Point Representation

1. Binary Number Systems

  • Binary Basics:

    • Each digit (bit) is either 0 or 1.

    • Binary numbers are used to represent all data in computers.

    • Example: 1011 in binary is 11 in decimal.

  • Binary to Decimal Conversion:

    • Each bit represents a power of 2.

    • Example: 1011 = 1×23 + 0×22 + 1×21 + 1×20 = 11.

  • Decimal to Binary Conversion:

    • Divide by 2 and record remainders.

    • Example: 11 in decimal is 1011 in binary.


2. Encoding Integers

  • Unsigned Integers (B2U):

    • Represents non-negative numbers.

    • Range: 0 to 2w – 1 (where w is the

Read More

Supercomputers, Mainframes, and Other Computer Types

Supercomputer: Let’s explain the type of computer known as a supercomputer and its significance in modern computing. Supercomputers are the largest and fastest computers, capable of processing trillions of functions in seconds. These computers are primarily used for data-intensive and computation-intensive scientific tasks such as password encryption and decryption, weather forecasting, exploring the solar system, molecular modeling, etc.

Some of the advantages of using this type of computer are:

Read More

Hash Tables, Binary Trees, Graphs, Balanced Trees, Heaps & DP

Chapter 6: Hash Tables

What is a Hash Table?

A hash table is a data structure used to store key-value pairs efficiently. It uses a hashing function to compute an index (or hash) from the key, where the value is stored in an array-like structure.

1. Collisions

Collisions occur when two keys hash to the same index in the hash table. Hash tables must handle collisions to work correctly. Common methods for collision resolution:

  • Chaining
    • Each slot in the hash table holds a linked list of key-value pairs.
    • When
Read More

Essential MS Office & Access Commands and Functions

1. Essential Keyboard Shortcuts

  • Shift + Ctrl + M: Change font size
  • Shift + Ctrl + F: Change font type
  • Shift + Ctrl + D: Double underline text
  • Shift + Ctrl + L: Convert lowercase to uppercase
  • Ctrl + Alt + I: View document in Print Preview
  • Ctrl + M: Change font, font style, font size
  • Shift + Ctrl + U: Convert uppercase to lowercase
  • Ctrl + R: Close the existing document
  • F12: Show the “Save As” window

2. Formula for Table of Letters Results

Formula to display results for “PASA YEAR’S LOSE THE YEAR, SUPLETORIO”

Read More

Understanding Microprocessor Architecture: CISC vs RISC

Microprocessor Architecture Explained

Microprocessors: A component that incorporates all the functions of the CPU on a single integrated circuit.

Technological Characteristics

  • Instruction set that can run.
  • Word size (number of bits) which the microprocessor processes in a single operation.
  • The clock speed supported (the rate at which it can work).
  • Instruction pipelining (which allows multiple instructions to be processed simultaneously in a chain-like assembly).
  • Instruction set architecture.
  • Data path or
Read More