MEMORY Bhakti Yudho Suprapto,MT. berfungsi untuk memuat program dan juga sebagai tempat untuk menampung hasil proses bersifat volatile yang berarti bahwa.

Slides:



Advertisements
Presentasi serupa
INTRO (TO BPOS). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah layanan online Microsoft,
Advertisements

Pengujian Hipotesis untuk Satu dan Dua Varians Populasi
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All.
Mata Kuliah : ALGORITMA dan STRUKTUR DATA 1.
PEMOGRAMAN BERBASIS JARINGAN
Program Keahlian I – SI By Antonius Rachmat C, S.Kom
Heat Insulation and Sound Insulation Displays
Peta Kontrol (Untuk Data Variabel)
File Handling.
Process to Process Delivery
INTRODUCTION TO PSYCHOLOGY. Recommended Literature 1. Introduction to Psychology : Gateway to Mind and Behavior by Dennis Coon and John O. Mitterer 2.
Chapter Nine The Conditional.
PERULANGANPERULANGAN. 2 Flow of Control Flow of Control refers to the order that the computer processes the statements in a program. –Sequentially; baris.
Slide 3-1 Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Revised by IB & SAM, Fasilkom UI, 2005 Exercises Apa saja komponen utama.
IF-ITB/SAS/25Aug2003 IF7074 – Bagian Pertama Page 1 IF 7047 Kewirausahaan Teknologi Informasi Bagian Pertama: 1.1. Entrepreneurship, entrepreneur, dan.
Penerapan Fungsi Non-Linier
PENGENALAN PL/SQL.
PROSES PADA WINDOWS Pratikum SO. Introduksi Proses 1.Program yang sedang dalam keadaan dieksekusi. 2.Unit kerja terkecil yang secara individu memiliki.
Review Operasi Matriks
1 IKI10230 Pengantar Organisasi Komputer Kuliah no. A4: Bahasa Rakitan AVR Conditional & Branch Instructions 21 Maret 2003 Bobby Nazief
TEKNOLOGI WIRELESS Modul 1 - Teknologi Wireless.
Pengantar/pengenalan (Introduction)
Bilqis1 Pertemuan bilqis2 Sequences and Summations Deret (urutan) dan Penjumlahan.
Menjelaskan sifat – sifat komponen elektronika aktif dan pasif
KULIAH X FIREWALL KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Implementing an REA Model in a Relational Database
Pendugaan Parameter part 2
2nd MEETING Assignment 4A “Exploring Grids” Assignment 4 B “Redesign Grids” Create several alternatives grid sysytem using the provided elements: (min.
Project 4: Influence of the Block Size for Different Cache Sizes Oleh : Mohd Aziz Shah Bin Mohd Basir.
LESSON 10: LET’S COOK LEARNING FOCUS USING “a little” USING “a few”
Linked List dan Double Linked List
Definisi VLAN Pemisahan jaringan secara logis yang dilakukan pada switch Pada tradisional switch, dalam satu switch menunjukkan satu segmentasi LAN.
Amortization & Depresiasi
Contentment Philippians 4: Contentment What does it mean to be content? What does it mean to be content? Are you a content person? Are you a content.
Struktur Register dan Metode Pengalamatan Memori
STRUCTURAL CONTROL continuation STATEMENT  SWITCH  WHILE  DO..WHILE.
THE EFFICIENT MARKETS HYPOTHESIS AND CAPITAL ASSET PRICING MODEL
1. 2 Work is defined to be the product of the magnitude of the displacement times the component of the force parallel to the displacement W = F ║ d F.
© 2009 Fakultas Teknologi Informasi Universitas Budi Luhur Jl. Ciledug Raya Petukangan Utara Jakarta Selatan Website:
PERSAMAAN DAN PERTIDAKSAMAAN
Romans 1: Romans 1:16-17 New Living Translation (NLT) 16 For I am not ashamed of this Good News about Christ. It is the power of God at work, saving.
PENJUMLAHAN GAYA TUJUAN PEMBELAJARAN:
SISTEM TERDISTRIBUSI (SILABUS dan Introduction to Distributed Systems)
The intensive state of a PVT system containing N chemical species and  phases in equilibrium is characterized by the intensive variables, temperature.
TCP, THREE-WAY HANDSHAKE, WINDOW
ASSALAMU’ALAIKUM Wr.Wb I will be presenting on how to make ice cream (Assalamu'alaikum Wr.Wb Saya akan menyajikan tentang cara untuk membuat es krim) Name:M.
Menu Standard Competence Based Competence.
Retrosintetik dan Strategi Sintesis
Web Teknologi I (MKB511C) Minggu 12 Page 1 MINGGU 12 Web Teknologi I (MKB511C) Pokok Bahasan: – Text processing perl-compatible regular expression/PCRE.
Made by: Febri, Andrew, Erina, Leon, Luvin, Jordy
Lecture 2 Introduction to C# - Object Oriented Sandy Ardianto & Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
RANGKAIAN LOGIKA KOMBINASIONAL
K-Map Using different rules and properties in Boolean algebra can simplify Boolean equations May involve many of rules / properties during simplification.
Presented By : Group 2. A solution of an equation in two variables of the form. Ax + By = C and Ax + By + C = 0 A and B are not both zero, is an ordered.
Menulis Kolom  Kolom adalah opini atau artikel. Tidak seperti editorial, kolom memiliki byline.  Kolom Biasanya ditulis reguler. Biasanya mingguan atau.
Struktur Register dan Metode Pengalamatan
Kode Hamming.
VECTOR VECTOR IN PLANE.
REAL NUMBERS EKSPONENT NUMBERS.
Struktur Register dan Metode Pengalamatan Memori
THE INFORMATION ABOUT HEALTH INSURANCE IN AUSTRALIA.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Do you want to check your Zoho mail incoming or outgoing logs and unable to check, go through with this article and access Zoho mail incoming or outgoing.
 Zoho Mail offers easy options to migrate data from G Suite or Gmail accounts. All s, contacts, and calendar or other important data can be imported.
Fix problems opening Norton  Fix problems opening Norton This problem can happen after you update Norton. To fix the matter, restart the computer. Fix.
If you are an user, then you know how spam affects your account. In this article, we tell you how you can control spam’s in your ZOHO.
Al Muizzuddin F Matematika Ekonomi Lanjutan 2013
Lecture 8 Normal model.
Draw a picture that shows where the knife, fork, spoon, and napkin are placed in a table setting.
Wednesday/ September,  There are lots of problems with trade ◦ There may be some ways that some governments can make things better by intervening.
Transcript presentasi:

MEMORY Bhakti Yudho Suprapto,MT

berfungsi untuk memuat program dan juga sebagai tempat untuk menampung hasil proses bersifat volatile yang berarti bahwa data yang disimpan cuma sebatas adanya aliran listrik. Jadi bila listrik mati maka hilang pulalah semua data yang ada di dalamnya. Hal ini mengakibatkan diperlukannya media penyimpan kedua yang biasanya berupa disket maupun hard disk

Pembagian Memori Memori komputer terbagi atas 16 blok dengan fungsi-fungsi khusus yang sebagian besar adalah sebagai RAM (Random Access Memory) yang berfungsi sebagai penyimpan bagi hasil pengolahan pada komputer itu sendiri

block fungsi 0 RAM 1 RAM 2 RAM 3 RAM 4 RAM 5 RAM 6 RAM 7 RAM

8 RAM 9 RAM A EXTENDED VIDEO MEMORI B EXTENDED VIDEO MEMORY C PERLUASAN ROM D FUNGSI LAIN E FUNGSI LAIN F BIOS & BASIC

Memory Access to access memory we can use these four registers: BX, SI, DI, BP. combining these registers inside [ ] symbols, we can get different memory locations. these combinations are supported (addressing modes):

[BX + SI] [BX + DI] [BP + SI] [BP + DI] [SI] [DI] d16 (variable offset only) [BX] [BX + SI + d8] [BX + DI + d8] [BP + SI + d8] [BP + DI + d8] [SI + d8] [DI + d8] [BP + d8] [BX + d8] [BX + SI + d16] [BX + DI + d16] [BP + SI + d16] [BP + DI + d16] [SI + d16] [DI + d16] [BP + d16] [BX + d16]

 d8 - stays for 8 bit signed immediate displacement (for example: 22, 55h, -1, etc...)  d16 - stays for 16 bit signed immediate displacement (for example: 300, 5517h, -259, etc...).

 displacement can be a immediate value or offset of a variable, or even both. if there are several values, assembler evaluates all values and calculates a single immediate value.. displacement can be inside or outside of the [ ] symbols, assembler generates the same machine code for both ways. displacement is a signed value, so it can be both positive or negative. generally the compiler takes care about difference between d8 and d16, and generates the required machine code.

 for example, let's assume that DS = 100, BX = 30, SI = 70. The following addressing mode: [BX + SI] + 25 is calculated by processor to this physical address: 100 * = by default DS segment register is used for all modes except those with BP register, for these SS segment register is used.

 there is an easy way to remember all those possible combinations using this chart:  you can form all valid combinations by taking only one item from each column or skipping the column by not taking anything from it. as you see BX and BP never go together. SI and DI also don't go together. here are an examples of a valid addressing modes: [BX+5], [BX+SI], [DI+ BX-4]

 the value in segment register (CS, DS, SS, ES) is called a segment, and the value in purpose register (BX, SI, DI, BP) is called an offset. When DS contains value 1234h and SI contains the value 7890h it can be also recorded as 1234:7890. The physical address will be 1234h * 10h h = 19BD0h. if zero is added to a decimal number it is multiplied by 10, however 10h = 16, so if zero is added to a hexadecimal value, it is multiplied by 16, for example: 7h = 7 70h = 112