Your browser doesn't support the features required by impress.js, so you are presented with a simplified version of this presentation.

For the best experience please use the latest Chrome, Safari or Firefox browser.

CIS 115

Lecture 28: Computer Architecture

Fixed Program Computers

Image Source: Wikipedia

John von Neumann

Image Source: Wikipedia

Stored Program Computers

Von Neumann Architecture

Image Source: Wikipedia

System Bus

Image Source: Wikipedia

Image Source: Wikipedia

Instruction Set Architecture (ISA)

Image Source: Wikipedia

Hardware Classes

  1. Internal Components
  2. Storage
  3. Peripherals
  4. Cables & Connectors



Information from Wikibooks

Motherboard Features

Old Motherboard Diagram

Image Credit: Wikipedia

New Motherboard Diagram

Image Credit: Wikipedia

Processor

Image Credit: Wikipedia

Processor Features


cpuboss.com - Intel Core i7 3970X

Intel Core i7 3970X vs. AMD FX 9370

Memory (RAM)

Image Credit: Wikipedia

Memory Features

Graphics Card

Image Credit: Wikipedia

Graphics Card Features


gpuboss.com - EVGA GeForce GTX TITAN

EVGA GeForce GTX TITAN vs AMD Radeon HD 7970

Hard Disk Drive (HDD)

Image Credit: Wikipedia

Solid State Drive (SSD)

Image Credit: Wikipedia

Disk Drive Features

Comparison

Image Credit: Computerworld

RAID

Optical Disk Drive (ODD)

Image Credit: Wikipedia

Optical Disk Comparison

Type Capacity Speed
CD 800 MB up to 88Mbit/s (72x)
DVD 4.7/8.5 GB 11.08 Mbit/s
Blu-ray 25/128 GB 54 Mbit/s

Power Supply (PSU)

Image Credit: Wikipedia

Device Usage
Video Card 50-150W / plug
PCI Card 5-10W
ODD 20-30W
HDD 15-30W
SSD ~5W
Motherboard 50-150W
RAM ~15W / DIMM
Processor 80-140W

Information from PCPower.com

Note: multiply by 1.5 to account for real usages and efficiency

Image Credit: build-your-own-computer.net

Other Peripherals

Assignments

Blog 13: Cybersecurity

You are employed by a large, multinational corporation, and your responsibility is to protect your companies network, intellectual data, customer data, and computer systems from attack. We’ve spent time in class discussing many different topics related to cybersecurity, but now is your chance to use that knowledge. Tell us how you would go about defending your company from malicious users.