Microprocessor - Syllabus
Embark on a profound academic exploration as you delve into the Microprocessor course () within the distinguished Tribhuvan university's CSIT department. Aligned with the 2065 Syllabus, this course (CSC-153) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60+20+20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Units
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
SAP Architectures, Instructions, Microprogram; 8-bit "W" bus, 4-bit program counter, 4-bit Memory Address Register (MAR), 16x8-bit memory, 8-bit instruction register (IR), 6-cycle controller with 12-bit micro-instruction word, 8-bit accumulator, 8-bit B register, 8-bit adder-subtractor, 8-bit output register, SAP-1 Instructions, Fetch & Execution, microprogram, fetch cycle, execution cycle, microprogram, controller implementation, SAP 2 Architecture, architectural differences with SAP-1, bi-directional registers, instruction set, flags.
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
-
Pure vs Partial E-commerce
IN-4Types of E-commerce models and their applications.
-
History of E-commerce
IN-5Evolution and development of E-commerce over time.
-
E-commerce Framework
IN-6Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
-
Pure vs Partial E-commerce
IN-4Types of E-commerce models and their applications.
-
History of E-commerce
IN-5Evolution and development of E-commerce over time.
-
E-commerce Framework
IN-6Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.
-
Types of E-commerce
IN-7Overview of different types of E-commerce including B2C, B2B, C2B, C2C, M-Commerce, U-commerce, Social-Ecommerce, and Local E-commerce.
-
Challenges in E-commerce
IN-8Common obstacles and difficulties faced in E-commerce.
-
Status of E-commerce in Nepal
IN-9Current state and trends of E-commerce in Nepal.
-
Overview of Electronic Transaction Act of Nepal
IN-10Understanding the legal framework governing E-commerce in Nepal.
Key Topics
-
Number Theory
AS-1Introduction to number theory concepts, including prime numbers, Fermat's theorem, Euler's theorem, primality testing, Miller-Rabin algorithm, extended Euclidean theorem, and discrete logarithms.
-
Public Key Cryptosystems
AS-2Overview of public key cryptosystems, including their applications and uses.
-
Key Distribution
AS-3Methods for distributing public and secret keys, including Diffie-Hellman key exchange and the risks of man-in-the-middle attacks.
-
RSA Algorithm
AS-4In-depth explanation of the RSA algorithm, a widely used public key encryption technique.
-
Elgamal Cryptographic System
AS-5Introduction to the Elgamal cryptographic system, a public key cryptosystem based on discrete logarithms.
-
Linking
AS-6Linking is the process of combining object files generated by the assembler into a single executable file. It resolves external references and assigns addresses to program segments.
-
Assembler Directives
AS-7Assembler directives are special instructions that guide the assembler during the assembly process. They can define data, reserve memory, and specify the program's starting address.
-
Addressing Modes
AS-8Addressing modes determine how the CPU accesses memory locations. They include immediate, register, and memory addressing modes.
-
Simple Sequence Programs
AS-9Simple sequence programs are assembly language programs that execute a series of instructions in a linear sequence. They are used to perform basic tasks and illustrate the basics of assembly language programming.
-
Flags
AS-10Flags are single-bit registers that indicate the outcome of arithmetic and logical operations. They are used to control the flow of a program and make decisions based on the results of previous operations.
-
Branch and Jump Instructions
AS-11Branch and jump instructions are used to control the flow of a program by transferring control to a different location in the program. They can be conditional or unconditional.
-
While-Do Loops
AS-12While-do loops are a type of control structure that execute a block of code repeatedly while a condition is true. They are used to perform repetitive tasks.
-
Repeat-Until Loops
AS-13Repeat-until loops are a type of control structure that execute a block of code repeatedly until a condition is true. They are used to perform repetitive tasks.
Key Topics
-
Memory Read
BA-01Memory Read operation involves retrieving data from memory locations. It is a fundamental operation in microprocessor-based systems.
-
Memory Write
BA-02Memory Write operation involves storing data in memory locations. It is a crucial operation in microprocessor-based systems.
-
I/O Read
BA-03I/O Read operation involves retrieving data from input/output devices. It enables the microprocessor to interact with the external environment.
-
I/O Write
BA-04I/O Write operation involves sending data to input/output devices. It enables the microprocessor to interact with the external environment.
-
Direct Memory Access
BA-05Direct Memory Access (DMA) is a technique that allows peripheral devices to access system memory directly, reducing the microprocessor's workload.
-
Interrupt
BA-06An interrupt is a signal to the microprocessor that an event has occurred, requiring immediate attention. It enables the microprocessor to handle asynchronous events.
-
Types of Interrupts
BA-07There are different types of interrupts, including maskable and non-maskable interrupts, which vary in their priority and handling by the microprocessor.
-
Interrupt Masking
BA-08Interrupt Masking is a technique that enables the microprocessor to temporarily ignore or mask interrupts, allowing it to focus on high-priority tasks.
-
Non-Overlapping Lists
BA-09Non-overlapping lists are used in some retrieval models to improve the efficiency of retrieval by reducing the number of documents to be ranked.
Parallel communication, Serial communication, Data transfer wait operation, 8255A working, 8255A Modes, RS-232 interface, Keyboard and display controller.