CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

Similar documents
CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

ASCII Code - The extended ASCII table

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS

Chapter 3. Information Representation

Chapter 2 Number System

Chemistry Hour Exam 2

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations

Data Representation and Binary Arithmetic. Lecture 2

CPS 104 Computer Organization and Programming Lecture-2 : Data representations,

Chapter 2 Bits, Data Types, and Operations

Representing Things With Bits

Fundamentals of Programming (C)

Number Systems Base r

9/3/2015. Data Representation II. 2.4 Signed Integer Representation. 2.4 Signed Integer Representation

Chapter 2 Bits, Data Types, and Operations

Number System (Different Ways To Say How Many) Fall 2016

Acquirer JCB EMV Test Card Set

Numbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras

Number Systems II MA1S1. Tristan McLoughlin. November 30, 2013

Fundamentals of Programming

Positional Number System

First Data Dual Interface EMV Test Card Set. Version 1.20

Number Representations

Bits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices.

First Data EMV Test Card Set. Version 1.30

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

First Data EMV Test Card Set. Version 2.00

Chapter 2 Bits, Data Types, and Operations

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme

EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

EE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

Under the Hood: Data Representation. Computer Science 104 Lecture 2

Acquirer JCB Dual Interface EMV Test Card Set

Number Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

3.1. Unit 3. Binary Representation

4. Specifications and Additional Information

First Data DCC Test Card Set. Version 1.30

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

EE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

Coding Theory. Networks and Embedded Software. Digital Circuits. by Wolfgang Neff

EE 109 Unit 2. Binary Representation Systems

Interac USA Interoperability EMV Test Card Set

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

Oberon Data Types. Matteo Corti. December 5, 2001

UNIT 2 NUMBER SYSTEM AND PROGRAMMING LANGUAGES

Unit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation

Experiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program.

Fundamental Data Types

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

Exercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014

n NOPn Unary no operation trap U aaa NOP Nonunary no operation trap i

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

AutoLISP Module 6 Competency Test No.1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

FD-011WU. 2D Barcode Reader User Guide V1.6CC

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

S-Series Sensor ASCII Protocol v8.1.0

1. Character/String Data, Expressions & Intrinsic Functions. Numeric Representation of Non-numeric Values. (CHARACTER Data Type), Part 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey

Characters Lesson Outline

ASSIGNMENT 5 TIPS AND TRICKS

The Binary Number System

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

Do not start the test until instructed to do so!

Inf2C - Computer Systems Lecture 2 Data Representation

MACHINE LEVEL REPRESENTATION OF DATA

CS341 *** TURN OFF ALL CELLPHONES *** Practice NAME

Digital Logic. The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer.

Simple Data Types in C. Alan L. Cox

COMP2611: Computer Organization. Data Representation

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital

Chapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2

Midterm Exam, Fall 2015 Date: October 29th, 2015

Lecture (09) x86 programming 8

C1098 JPEG Module User Manual

Source coding and compression

Data Representation COE 301. Computer Organization Prof. Muhamed Mudawar

Chapter 8. Characters and Strings

First Data U.S. Debit Test Card Set. Version 1.20

Mounting Dimensions / Viewing 2 Mounting Options 3. Wiring Configuration 4. Quick Set up Procedure 5. Changing Intensity 6.

Rui Wang, Assistant professor Dept. of Information and Communication Tongji University.

July Registration of a Cyrillic Character Set. Status of this Memo

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

Computer (Literacy) Skills. Number representations and memory. Lubomír Bulej KDSS MFF UK

Do not start the test until instructed to do so!

Transcription:

CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22

TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats (briefly) Characters & strings

BITS OF MEMORY

Random Access Memory (RAM) A single byte of memory holds 8 binary digits (bits). Each byte of memory has its own address. A 32-bit CPU can address 4 gigabytes of memory, but a machine may have much less (e.g., 256MB). For now, think of RAM as one big array of bytes. The data stored in a byte of memory is not typed. The assembly language programmer must remember whether the data stored in a byte is a character, an unsigned number, a signed number, part of a multi-byte number,... UMBC, CMSC33, Richard Chang <chang@umbc.edu>

4-5 Chapter 4: The Instruction Set Architecture Common Sizes for Data Types A byte is composed of 8 bits. Two nibbles make up a byte. Halfwords, words, doublewords, and quadwords are composed of bytes as shown below: Bit Nibble Byte 6-bit word (halfword) 32-bit word 64-bit word (double) 28-bit word (quad) Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

4-6 Chapter 4: The Instruction Set Architecture Big-Endian and Little-Endian Formats In a byte-addressable machine, the smallest datum that can be referenced in memory is the byte. Multi-byte words are stored as a sequence of bytes, in which the address of the multi-byte word is the same as the byte of the word that has the lowest address. When multi-byte words are used, two choices for the order in which the bytes are stored in memory are: most significant byte at lowest address, referred to as big-endian, or least significant byte stored at lowest address, referred to as little-endian. Byte 3 Big-Endian 3 Little-Endian MSB LSB MSB LSB x x+ x+2 x+3 x+3 x+2 x+ x Word address is x for both big-endian and little-endian formats. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

NEGATIVE NUMBERS

2- Chapter 2: Data Representation Signed Fixed Point Numbers For an 8-bit number, there are 2 8 = 256 possible bit patterns. These bit patterns can represent negative numbers if we choose to assign bit patterns to numbers in this way. We can assign half of the bit patterns to negative numbers and half of the bit patterns to positive numbers. Four signed representations we will cover are: Signed Magnitude One s Complement Two s Complement Excess (Biased) Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-2 Chapter 2: Data Representation Signed Magnitude Also know as sign and magnitude, the leftmost bit is the sign ( = positive, = negative) and the remaining bits are the magnitude. Example: +25 = 2-25 = 2 Two representations for zero: + = 2, - = 2. Largest number is +27, smallest number is -27, using an 8-bit representation. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-3 Chapter 2: Data Representation One s Complement The leftmost bit is the sign ( = positive, = negative). Negative of a number is obtained by subtracting each bit from 2 (essentially, complementing each bit from to or from to ). This goes both ways: converting positive numbers to negative numbers, and converting negative numbers to positive numbers. Example: +25 = 2-25 = 2 Two representations for zero: + = 2, - = 2. Largest number is +27, smallest number is -27, using an 8- bit representation. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-4 Chapter 2: Data Representation Two s Complement The leftmost bit is the sign ( = positive, = negative). Negative of a number is obtained by adding to the one s complement negative. This goes both ways, converting between positive and negative numbers. Example (recall that -25 in one s complement is 2 ): +25 = 2-25 = 2 One representation for zero: + = 2, - = 2. Largest number is +27, smallest number is -28, using an 8- bit representation. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-5 Excess (Biased) Chapter 2: Data Representation The leftmost bit is the sign (usually = positive, = negative). Positive and negative representations of a number are obtained by adding a bias to the two s complement representation. This goes both ways, converting between positive and negative numbers. The effect is that numerically smaller numbers have smaller bit patterns, simplifying comparisons for floating point exponents. Example (excess 28 adds 28 to the two s complement version, ignoring any carry out of the most significant bit) : +2 = 2-2 = 2 One representation for zero: + = 2, - = 2. Largest number is +27, smallest number is -28, using an 8- bit representation. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

Signed Magnitude Example: Convert -23 23 = 64 + 32 + 6 + 8 + 2 + = 2-23 => 2 One s Complement (flip the bits) -23 => 2 Two s Complement (add to one s complement) -23 => 2 Excess 28 (add 28 to two s complement) -23 => 2 UMBC, CMSC33, Richard Chang <chang@umbc.edu>

3-bit Signed Integer Representations Decimal Unsigned Sign Mag s Comp 2 s Comp Excess 4 7 6 5 4 3 2 / / - -2-3 -4 UMBC, CMSC33, Richard Chang <chang@umbc.edu>

2- Chapter 2: Data Representation Binary Addition This simple binary addition example provides background for the signed number representations to follow. Carry in Operands + + + + + + + + Carry out Sum Carry Addend: A Augend: B Sum + Example: (24) (9) (24) Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

3-4 Number Circle for 3-Bit Two s Complement Numbers Chapter 3: Arithmetic Numbers can be added or subtracted by traversing the number circle clockwise for addition and counterclockwise for subtraction. Overflow occurs when a transition is made from +3 to -4 while proceeding around the number circle when adding, or from -4 to +3 while subtracting. - Subtracting numbers -2 2-3 -4 3 Adding numbers Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

8-bit Two s Complement Addition 54 = + -48 = 6 = 44 = + -48 = -4 = -44 = + -48 = -92 = UMBC, CMSC33, Richard Chang <chang@umbc.edu>

Two s Complement Overflow An overflow occurs if adding two positive numbers yields a negative result or if adding two negative numbers yields a positive result. Adding a positive and a negative number never causes an overflow. Carry out of the most significant bit does not indicate an overflow. An overflow occurs when the carry into the most significant bit differs from the carry out of the most significant bit. UMBC, CMSC33, Richard Chang <chang@umbc.edu>

Two s Complement Overflow Examples 54 = + 8 = 62-3 = + -48 = -5 UMBC, CMSC33, Richard Chang <chang@umbc.edu>

Two s Complement Sign Extension Decimal 8-bit 6-bit +5-5 Why does sign extension work? -x is represented as 2 8 - x in 8-bit -x is represented as 2 6 - x in 6-bit 2 8 - x +??? = 2 6 - x??? = 2 6-2 8 = 65536 - = 256 = 6528 UMBC, CMSC33, Richard Chang <chang@umbc.edu>

MODULO ARITHMETIC

Is Two s Complement Magic? Why does adding positive and negative numbers work? Why do we add to the one s complement to negate? Answer: Because modulo arithmetic works. UMBC, CMSC33, Richard Chang <chang@umbc.edu>

Modulo Arithmetic Definition: Let a and b be integers and let m be a positive integer. We say that a b (mod m) if the remainder of a divided by m is equal to the remanider of b divided by m. In the C programming language, a b (mod m) would be written a % m == b % m We use the theorem: If a b (mod m) and c d (mod m) then a + c b + d (mod m).

ATheoremofModuloArithmetic Thm: If a b (mod m) and c d (mod m) then a + c b + d (mod m). Example: Let m =8, a =3, b =27, c =2and d =8. 3 27 (mod 8) and 2 8 (mod 8). 5 45 (mod 8). Proof: Write a = q a m + r a, b = q b m + r b, c = q c m + r c and d = q d m + r d, where r a, r b, r c and r d are between and m. Then, a + c =(q a + q c )m + r a + r c b + d =(q b + q d )m + r b + r d =(q b + q d )m + r a + r c. Thus, a + c r a + r c b + d (mod m). 2

Consider Numbers Modulo 256 2 = 256 256 52 2 = 255 257 53 2 = 2 254 258 54. 2 = 5 24 27 527. 2 = 27 29 383 639 2 = 28 28 384 64. 2 = 43 3 399 655. 2 = 243 3 499 755. 2 = 255 5 767 If 2 thru 2 represents thru 27 and 2 thru 2 represents -28 thru -, then the most significant bit can be used to determine the sign. 3

Some Answers In 8-bit two s complement, we use addition modulo 2 8 =256,soadding 256 or subtracting 256 is equivalent to adding or subtracting. To negate a number x, x 28: x = x 256 x =(255 x)+=( 2 x)+ Note that 2 x is the one s complement of x. Now we can just add positive and negative numbers. For example: 3+( 5) 3+(256 5) = 3 + 25 = 254 254 256 = 2. or two negative numbers (as long as there s no overflow): ( 3) + ( 5) (256 3) + (256 5) = 54 54 52 = 8. 4

FLOATING POINT NUMBERS

IEEE-754 32-bit Floating Point Format sign bit, 8-bit exponent, 23-bit mantissa normalized as.xxxxx leading is hidden 8-bit exponent in excess 27 format NOT excess 28 and are reserved + and - is zero exponent and zero mantissa exponent and zero mantissa is infinity UMBC, CMSC33, Richard Chang <chang@umbc.edu>

2-27 Chapter 2: Data Representation IEEE-754 Floating Point Formats 32 bits Single precision Sign ( bit) 8 bits 23 bits Exponent Fraction 64 bits Double precision bits 52 bits Exponent Fraction Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-29 Chapter 2: Data Representation IEEE-754 Conversion Example Represent -2.625 in single precision IEEE-754 format. Step #: Convert to target base. -2.625 = -. 2 Step #2: Normalize. -. 2 = -. 2 2 3 Step #3: Fill in bit fields. Sign is negative, so sign bit is. Exponent is in excess 27 (not excess 28!), so exponent is represented as the unsigned integer 3 + 27 = 3. Leading of significand is hidden, so final bit pattern is:. Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-28 Chapter 2: Data Representation IEEE-754 Examples Value Bit Pattern (a) +. 2 5 Sign Exponent Fraction (b). 2 26 (c) +. 2 27 (d) + (e) (f) + (g) +2 28 (h) +NaN (i) +2 28 Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

CHARACTERS & STRINGS

2-3 Chapter 2: Data Representation ASCII Character Code ASCII is a 7-bit code, commonly stored in 8-bit bytes. A is at 4 6. To convert upper case letters to lower case letters, add 2 6. Thus a is at 4 6 + 2 6 = 6 6. The character 5 at position 35 6 is different than the number 5. To convert character-numbers into number-numbers, subtract 3 6 : 35 6-3 6 = 5. NUL SOH 2 STX 3 ETX 4 EOT 5 ENQ 6 ACK 7 BEL 8 BS 9 HT A LF B VT C FF D CR E SO F SI NUL SOH STX ETX EOT ENQ ACK BEL BS HT LF VT DLE DC 2 DC2 3 DC3 4 DC4 5 NAK 6 SYN 7 ETB 8 CAN 9 EM A SUB B ESC C FS D GS E RS F US 2 SP 2! 22 " 23 # 24 $ 25 % 26 & 27 ' 28 ( 29 ) 2A * 2B + 2C 2D - 2E. 2F / Null Start of heading Start of text End of text End of transmission Enquiry Acknowledge Bell Backspace Horizontal tab Line feed Vertical tab FF CR SO SI DLE DC DC2 DC3 DC4 NAK SYN ETB 3 3 32 2 33 3 34 4 35 5 36 6 37 7 38 8 39 9 3A : 3B ; 3C < 3D = 3E > 3F? 4 @ 4 A 42 B 43 C 44 D 45 E 46 F 47 G 48 H 49 I 4A J 4B K 4C L 4D M 4E N 4F O 5 P 5 Q 52 R 53 S 54 T 55 U 56 V 57 W 58 X 59 Y 5A Z 5B [ 5C \ 5D ] 5E ^ 5F _ Form feed Carriage return Shift out Shift in Data link escape Device control Device control 2 Device control 3 Device control 4 Negative acknowledge Synchronous idle End of transmission block 6 ` 6 a 62 b 63 c 64 d 65 e 66 f 67 g 68 h 69 i 6A j 6B k 6C l 6D m 6E n 6F o CAN EM SUB ESC FS GS RS US SP DEL 7 p 7 q 72 r 73 s 74 t 75 u 76 v 77 w 78 x 79 y 7A z 7B { 7C 7D } 7E ~ 7F DEL Cancel End of medium Substitute Escape File separator Group separator Record separator Unit separator Space Delete Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-32 Chapter 2: Data Representation EBCDIC Character Code EBCDIC is an 8-bit code. STX Start of text RS Reader Stop DC Device Control BEL Bell DLE Data Link Escape PF Punch Off DC2 Device Control 2 SP Space BS Backspace DS Digit Select DC4 Device Control 4 IL Idle ACK Acknowledge PN Punch On CU Customer Use NUL Null SOH Start of Heading SM Set Mode CU2 Customer Use 2 ENQ Enquiry LC Lower Case CU3 Customer Use 3 ESC Escape CC Cursor Control SYN Synchronous Idle BYP Bypass CR Carriage Return IFS Interchange File Separator CAN Cancel EM End of Medium EOT End of Transmission RES Restore FF Form Feed ETB End of Transmission Block SI Shift In TM Tape Mark NAK Negative Acknowledge SO Shift Out UC Upper Case SMM Start of Manual Message DEL Delete FS Field Separator SOS Start of Significance SUB Substitute HT Horizontal Tab IGS Interchange Group Separator NL New Line VT Vertical Tab IRS Interchange Record Separator LF Line Feed UC Upper Case IUS Interchange Unit Separator NUL 2 DS 4 SP 6 8 A C { E \ SOH 2 SOS 4 6 / 8 a A ~ C A E 2 STX 22 FS 42 62 82 b A2 s C2 B E2 S 3 ETX 23 43 63 83 c A3 t C3 C E3 T 4 PF 24 BYP 44 64 84 d A4 u C4 D E4 U 5 HT 25 LF 45 65 85 e A5 v C5 E E5 V 6 LC 26 ETB 46 66 86 f A6 w C6 F E6 W 7 DEL 27 ESC 47 67 87 g A7 x C7 G E7 X 8 28 48 68 88 h A8 y C8 H E8 Y 9 29 49 69 89 i A9 z C9 I E9 Z A SMM 2A SM 4A 6A 8A AA CA EA B VT 2B CU2 4B 6B, 8B AB CB EB C FF 2C 4C < 6C % 8C AC CC EC D CR 2D ENQ 4D ( 6D _ 8D AD CD ED E SO 2E ACK 4E + 6E > 8E AE CE EE F SI 2F BEL 4F 6F? 8F AF CF EF DLE 3 5 & 7 9 B D } F DC 3 5 7 9 j B D J F 2 DC2 32 SYN 52 72 92 k B2 D2 K F2 2 3 TM 33 53 73 93 l B3 D3 L F3 3 4 RES 34 PN 54 74 94 m B4 D4 M F4 4 5 NL 35 RS 55 75 95 n B5 D5 N F5 5 6 BS 36 UC 56 76 96 o B6 D6 O F6 6 7 IL 37 EOT 57 77 97 p B7 D7 P F7 7 8 CAN 38 58 78 98 q B8 D8 Q F8 8 9 EM 39 59 79 99 r B9 D9 R F9 9 A CC 3A 5A! 7A : 9A BA DA FA B CU 3B CU3 5B $ 7B # 9B BB DB FB C IFS 3C DC4 5C. 7C @ 9C BC DC FC D IGS 3D NAK 5D ) 7D ' 9D BD DD FD E IRS 3E 5E ; 7E = 9E BE DE FE F IUS 3F SUB 5F 7F " 9F BF DF FF Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring

2-33 Unicode Character Code Unicode is a 6- bit code. 2 3 4 5 6 7 8 9 A B C D E F 2 3 4 5 6 7 8 9 A B C D E F NUL 2 SOH 2 STX 22 ETX 23 EOT 24 ENQ 25 ACK 26 BEL 27 BS HT 28 29 LF 2A VT 2B FF 2C CR 2D SO 2E SI 2F DLE 3 DC 3 DC2 32 DC3 33 DC4 34 NAK 35 SYN 36 ETB 37 CAN 38 EM 39 SUB ESC FS GS RS US 3A 3B 3C 3D 3E 3F SP! " # $ % & ' ( ) * + -. / 2 3 4 5 6 7 8 9 : ; < = >? 4 4 42 43 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F 5 5 52 53 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F NUL Null SOH Start of heading CAN Cancel SP Space STX Start of text EOT End of transmission EM End of medium DEL Delete ETX End of text DC Device control SUB Substitute Control ENQ Enquiry DC2 Device control 2 ESC Escape FF Form feed ACK Acknowledge DC3 Device control 3 FS File separator CR Carriage return BEL Bell DC4 Device control 4 GS Group separator SO Shift out BS Backspace NAK Negative acknowledge RS Record separator SI Shift in HT Horizontal tab NBS Non-breaking space US Unit separator DLE Data link escape LF Line feed ETB End of transmission block SYN Synchronous idle VT Vertical tab Principles of Computer Architecture by M. Murdocca and V. Heuring 999 M. Murdocca and V. Heuring @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ 6 6 62 63 64 65 66 67 68 69 6A 6B 6C 6D 6E 6F 7 7 72 73 74 75 76 77 78 79 7A 7B 7C 7D 7E 7F ` a b c d e f g h i j k l m n o p q r s t u v w x y z { } ~ DEL 8 8 82 83 84 85 86 87 88 89 8A 8B 8C 8D 8E 8F 9 9 92 93 94 95 96 97 98 99 9A 9B 9C 9D 9E 9F P Chapter 2: Data Representation A NBS C À E à A C Á E á A2 C2 Â E2 â A3 C3 Ã E3 ã A4 C4 Ä E4 ä A5 C5 Å E5 å A6 & C6 Æ E6 æ A7 C7 Ç E7 ç A8 C8 È E8 è A9 C9 É E9 é AA a CA Ê EA ê AB «CB Ë EB ë AC CC Ì EC ì AD CD Í ED í AE CE Î EE î AF CF Ï EF ï B D D F B ± D Ñ F ñ B2 2 D2 Ò F2 ò B3 3 D3 Ó F3 ó B4 D4 Ô F4 ô B5 µ D5 Õ F5 õ B6 D6 Ö F6 ö B7 D7 F7 B8 Ç D8 Ø F8 ø B9 D9 Ù F9 ù BA o DA Ú FA ú BB» DB Û FB û BC /4 DC Ü FC ü BD /2 DD Y FD BE 3/4 DE y FE p BF DF FF ÿ

NEXT TIME Basic Intel i-386 architecture Hello World in Linux assembly Addressing modes

CMSC 44 ALGORITHMS WITH PROF. KALPAKIS MEETS IN ITE 233 (THIS ROOM IS ITE 229)