Cpu Components And Functions Pdf To Word

Posted on by  admin

Tip: To select more than one part of the document at the same time, select the part that you want, then press CTRL and select more parts while you hold down the CTRL key.Under Exceptions, do one of the following:.To allow anyone who opens the document to edit the part that you selected, select the Everyone check box in the Groups list.To allow only particular individuals to edit the part that you selected, click More users, and then type the user names.Include your name if you want to be able to edit that part of the document. Separate each name with a semicolon.

Note: If you select more than one individual, those individuals are added as an item to the Groups box, so that you can quickly select them again.Continue to select parts of the document and assign users permission to edit them.Under Start enforcement, click Yes, Start Enforcing Protection.Do one of the following:.To assign a password to the document so that users who know the password can remove the protection and work on the document, type a password in the Enter new password (optional) box, and then confirm the password. Note: Use this option if you want other people to be able to work on the document at the same time.Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols. Weak passwords don't mix these elements. Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length. A pass phrase that uses 14 or more characters is better.Make sure you remember the password.

If you forget the password, Microsoft cannot retrieve it. Store passwords you write down in a secure place away from the information they help protect.To encrypt the document so that only authenticated owners of the document can remove the protection, click User authentication. Note: Encrypting the document prevents others from working on the document at the same time.Unlock a protected documentTo remove all protection from a document, you might need to know the password that was applied to the document. Tip: To select more than one part of the document at the same time, select the part that you want, then press CTRL and select more parts while you hold down the CTRL key.Under Exceptions, do one of the following:.To allow anyone who opens the document to edit the part that you selected, select the Everyone check box in the Groups list.To allow only particular individuals to edit the part that you selected, click More users, and then type the user names.Include your name if you want to be able to edit that part of the document. Separate each name with a semicolon. Note: If you select more than one individual, those individuals are added as an item to the Groups box, so that you can quickly select them again.Continue to select parts of the document and assign users permission to edit them.Under Start enforcement, click Yes, Start Enforcing Protection.Do one of the following:.To assign a password to the document so that users who know the password can remove the protection, type a password in the Enter new password (optional) box, and then confirm the password. Note: You must use this option if you intend to post the document so that multiple people can work on it at the same time.Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols.

Weak passwords don't mix these elements. Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length.

A pass phrase that uses 14 or more characters is better.It is critical that you remember your password. If you forget your password, Microsoft cannot retrieve it. Store the passwords that you write down in a secure place away from the information that they help protect.To encrypt the document so that only authenticated owners of the document can remove the protection, click User authentication. Note: Encrypting the document prevents authoring by more than one person at the same time.For more information about user authentication, see.Unlock a protected documentTo remove all protection from a document, you might need to know the password that was applied to the document. What do you want to do?Add protection mark the parts that can be changed.On the Review tab, in the Protect group, click Protect Document, and then click Restrict Formatting and Editing.In the Editing restrictions area, select the Allow only this type of editing in the document check box.In the list of editing restrictions, click No changes (Read only).Select the part of the document that you want to be unrestricted.For example, select a block of paragraphs, a heading, a sentence, or a word. Tip: To select more than one part of the document at the same time, select the part that you want, then press CTRL and select more parts while you hold down the CTRL key.Under Exceptions, do one of the following:.To allow anyone who opens the document to edit the part that you selected, select the Everyone check box in the Groups list.To allow only particular individuals to edit the part that you selected, click More users, and then type the user names.

Separate each name with a semicolon. Click OK, and then select the check boxes next to the names of the individuals that you are allowing to edit the part that you selected. Note: If you select more than one individual, those individuals are added as an item to the Groups box, so that you can quickly select them again.Continue to select parts of the document and assign users permission to edit them.Under Start enforcement, click Yes, Start Enforcing Protection.Do one of the following:.To assign a password to the document so that users who know the password can remove the protection, type a password in the Enter new password (optional) box, and then confirm the password.Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols. Weak passwords don't mix these elements.

Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length. A pass phrase that uses 14 or more characters is better.It is critical that you remember your password. If you forget your password, Microsoft cannot retrieve it. Store the passwords that you write down in a secure place away from the information that they help protect.To encrypt the document so that only authenticated owners of the document can remove the protection, click User authentication.Unlock a protected documentHaving permission to make changes in the document is not the same as having permission to remove protection from the document.

Word

Register organizationWithin the CPU, there is a set of registers that function as a level of memory above main memory and cache in the hierarchy. The registers in the CPU perform two roles:.

Concrete

User-visible registers: These enable the machine- or assembly-language pro­grammer to minimize main memory references by optimizing use of registers. Control and status registers: These are used by the control unit to control the operation of the CPU and by privileged, operating system programs to control the execution of programs.There is not a clean separation of registers into these two categories. For example, on some machines the program counter is user visible (e.g., Pentium), but on many it is not (e.g., PowerPC). For purposes of the following discussion, how­ever, we will use these categories. User-Visible RegistersA user-visible register is one that may be referenced by means of the machine lan­guage that the CPU executes.

Functions

We can characterize these in the following categories:. General purpose. Data. Address. Condition codesGeneral-purpose registers: can be assigned to a variety of functions by the pro­grammer. Sometimes their use within the instruction set is orthogonal to the opera­tion.

That is, any general-purpose register can contain the operand for any opcode. This provides true general-purpose register use. Often, however, there are restric­tions. For example, there may be dedicated registers for floating-point and stack operations. In some cases, general-purpose registers can be used for addressing functions (e.g.

Register indirect, displacement). In other cases, there is a partial or clean sep­aration between data registers and address registers.Data registers may be used only to hold data and cannot be employed in the calculation of an operand address.Address registers may themselves be somewhat general purpose, or they may be devoted to a particular addressing mode. Examples include the following:. Segment pointers: In a machine with segmented addressing, a segment register holds the address of the base of the segment. There may be multiple registers: for example, one for the operating system and one for the current process. Index registers: These are used for indexed addressing and may be autoindexed. Stack pointer: If there is user-visible stack addressing, then typically the stack is in memory and there is a dedicated register that points to the top of the slack.

This allows implicit addressing; that is, push, pop, and other slack in­structions need not contain an explicit stack operand.Condition codes register (also referred to as flags): Condition codes are bits set by the CPU hardware as the result of operations. For example, an arithmetic operation may pro­duce a positive, negative, zero, or overflow result.

In addition to the result itself being stored in a register or memory, a condition code is also set. The code may sub­sequently be tested as part of a conditional branch operation. Control and Status RegistersThere are a variety of CPU registers that are employed to control the operation of the CPU. Most of these, on most machines, are not visible to the user.

Cpu Components And Functions Pdf To Word Document

Some of them may be visible to machine instructions executed in a control or operating system mode.Of course, different machines will have different register organizations and use different terminology.

Comments are closed.