Computer Architecture Discussion Response

 

Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.

Original Question:  Please conduct your own research on Instruction Set Architecture (ISAs). Look over how they process address memory. Compare the similarities and differences of format, instructions, type of instructions, and addressing modes. 

Peer Response:  

 

Good day, all!

Instruction Set Architecture (ISA) can be described as the interface between a computer’s hardware and software. ISA dictates what a particular computer will support in terms of the computer’s features such as various hardware, I/O devices, registers, processors, etc. For instance, both Intel and AMD can build a processor using the x86 instruction set, but the physical formation of components within the two processors may be completely different. The instruction set simply serves as the basic outline for the computer, but leaves the actual implementation up to the builder. There are several types of ISAs including Reduced Instruction Set Computer (RISC), Complex Instruction Set Computer (CISC), and Minimal Instruction Set Computer (MISC). Each of these architectures consist of different strategies for storing and processing data.

Microprocessors Without Interlocked Pipelined Stages (MIPS) is an architecture which uses the RISC instruction set. It consists of thirty-two 32-bit registers and defines instructions such as Load and Store (for moving data between registers and memory), arithmetic instructions (add, multiply, etc.) and instructions for jumping to control the flow of data. Each instruction in this architecture holds 32 bits, and comes in one of three formats: R-type, I-type, and J-type. Each one begins with a 6 bit operation code which defines what operation is to be performed. R-type instructions also consist of 5 bits for the indices of two source registers, 5 bits for a destination register, 5 bits to define the shift amount, and 6 bits for the function to be performed. I-type instructions are used for immediate values, and J-type is used for jumping operations.

As mentioned above, the x86 instruction set holds some differences compared to the MIPS architecture. It consists of six general purpose registers and two special purpose registers (the stack pointer and base pointer). All registers are 32 bits long. Four of the six general purpose registers hold the ability to divide the register into one unique 16-bit subsection and two unique 8-bit subsections. x86 utilizes data movement instructions (such as mov, push, and pop), arithmetic instructions (such as logical operations, add, subtract, etc.) and control flow instructions (such as jump and compare). x86 allows for memory regions to be declared using labels, which the assembler replaces with 32-bit quantities that specify addresses in memory.

Thanks all and have a great day!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Journal 6

Each week you are to enter content into an online journal provided in Blackboard that briefly summarizes (1) the tasks you performed during your internship that week and (2) total hours worked with days/times. The content can be brief and in outline form and use bullet or another list styling, but keep in mind that this content will form the basis of the two major papers that you will write for this course. Therefore, the more detailed you are in your weekly journal, the easier it will be to finish the two papers. Specifically, your weekly journal should contain: 

• The days and times you worked that week, as well as the total hours, worked. (Provide this information at the top of each weekly section so this will act as a de facto heading to separate each weekly entry that you make.) 

• The skills or skillsets used/required to complete each task 

• Each task you performed along with a brief description of what you did.

 • A brief explanation of why the task needed to be done.

 • Was there an outcome? If so, what was that outcome?

 • What new terminology did you learn this week? Provide the term and its definition.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

I need to get this done

 

The goal of this project is to demonstrate your ability to use common applications to communicate and store information. You will use your IoT design and plan for this assignment. Now that you have learned how to use email, web browsers, and productivity software, you can start to apply those skills.

  1. First, you will use Microsoft Word to create a professional proposal document that is intended for some potential investors of your idea. It will need to be a comprehensive report using various formatting and styles. It should have clearly defined sections, images, and supporting tables and charts with data (fictional but realistic) regarding cost and other considerations. Apply as many of the concepts you learned in the tutorials as are reasonable to make this proposal look and feel professional.
  2. Next, you will use Microsoft Excel to continue the proposal by created spreadsheets with formulas and formatting to enhance the proposal. Whatever data you wish to invent and provide, there must be actual formulas used to calculate in the spreadsheet. You must also have both absolute and relative cell references, and at least one function. You will need to be sure to reference the spreadsheet in your proposal as an attachment or appendix. Remember this is part of a professional package that is intended for your investors! Make it look polished!
  3. Then, you will create a Microsoft PowerPoint presentation that gives a solid overview of your proposal and spreadsheets. There should be charts and tables derived from your Excel spreadsheet data, as well as information and images relating to your Word document inserted into the presentation. You must also apply themes, animations, and transitions to your work.
  4. Once your three artifacts are complete, reviewed, and polished, you will create a single folder in your OneDrive titled Module 3 Artifacts to store these items and upload them there.
    1. Create a shared link to this folder.  Your link MUST be accessible.  The permissions must be set to “anyone with a link can view.”  This is one-third of your score for this assignment.
    2. Draft an “email to your investors” (me). In a professional, business-like tone, you will ask them to review your documents via the link consider your proposal in so many words. DO NOT COPY the previous sentence and assume that is enough for the body of the email.  Your email must contain the link to your files!
    3. Attach a copy of your three artifacts and the email in the project submission link above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethical Hacking week 6

 Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Certifications

 

Chapter 14 of your text lists several professional certifications, both vendor-neutral and vendor-specific.

Which type of certification do you think is the most value? Why? Of that type, which do you think you’ll pursue? How do you see the knowledge gained from that certification aiding you in your career?

Your paper should be 3-4 pages long, with at least two scholarly resources published in the last year.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

OCTAVE MS Risk Management Approach

 

Provide a comparison of the OCTAVE Method of Risk Management to the Microsoft Risk Management Approach. Include which, in your opinion, provides a better framework to manage risk, but support your opinion with vetted references other than the course textbook.

Prepare a 350- to 1,050-word paper that fully discusses the topic questions

Format your paper consistent with APA guidelines. Format your paper consistent with APA guidelines

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Project

 In this Project Final you are to update, refine and combine the past seven weeks of Labs to create the Information Security Plan into final document. Remember that you are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. You are creating the final Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COSC 1301 IT

I need to complete this Homework:

 

Consider the network analogy from the module content (included below).  Review how the data flow in the analogy correlates to the TCPIP model.  Identify and thoroughly discuss three issues that you could foresee occurring in the flow.  Also, include your thoughts on how or if it can be prevented or mitigated.

Minimum requirements:

  • A minimum of three full paragraphs.
  • Submit only one document via the link title above.
  • Use paragraph structure. Use complete sentences and proper grammar and spelling.
  • Place a header on your page that contains your first and last name, the assignment name, and the course code from page two of the syllabus.
  • Your document must be one of the following formats (.doc, .docx, or .rtf).
  • Cite any and all sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Management Plan

Create a Project Management Plan.

Details on the Project: Project-Management-Plan Specifications v2.pdf
A Project Management Plan template is included to assist in this assignment. Project-Management-Plan template v2.docx

Please use the template attached, and make sure all the requirements are met listed in the Rubric.

When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 
Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and paste information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.
Submit your solution here.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c++ discussion

 What are the advantages and disadvantages of a stack in terms collecting elements of the same kind? Compared to an array, is a stack more efficient in execution and memory utilization? Why? Can you use an example to support your statement? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now