0% found this document useful (0 votes)
57 views3 pages

Course Title: Credit Value: 4 VENUE FOR LECTURE: University of Buea Venue For Tutorial: Same NAME (S) OF COURSE LECTRURER (S) : Nyanga Bernard Y

This document outlines a course on computer architecture. It is a 4-credit course taught at the University of Buea. The course covers topics like data representation, boolean algebra, instruction set architectures, memory organization, input/output systems, and alternative architectures over 13 weeks. Assessment includes two tests. The objective is to provide knowledge of computer architecture and its relation to software. Expected outcomes are understanding concepts and issues in computer architecture, instruction set architectures, system organization, and some assembly language. Recommended reading materials are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views3 pages

Course Title: Credit Value: 4 VENUE FOR LECTURE: University of Buea Venue For Tutorial: Same NAME (S) OF COURSE LECTRURER (S) : Nyanga Bernard Y

This document outlines a course on computer architecture. It is a 4-credit course taught at the University of Buea. The course covers topics like data representation, boolean algebra, instruction set architectures, memory organization, input/output systems, and alternative architectures over 13 weeks. Assessment includes two tests. The objective is to provide knowledge of computer architecture and its relation to software. Expected outcomes are understanding concepts and issues in computer architecture, instruction set architectures, system organization, and some assembly language. Recommended reading materials are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

COURSE TITLE: Computer Architecture (CEF 250)

CREDIT VALUE: 4
VENUE FOR LECTURE: University of Buea
VENUE FOR TUTORIAL: Same
NAME(S) OF COURSE LECTRURER(S): Nyanga Bernard Y.
----------------------------------------------------------------------------------------------------
WEEK SLOT TOPICS ACTIVITY
DAY TIME L T P
1 Introduction √
General background/Definition/Key Concepts
- Introduction √
 The difference between computer organization
and computer architecture
2  Units of measure common to computer √
systems.
 The evolution of computers.
 The computer as a layered system. √
o Thee von Neumann architecture and the
function of basic computer components
3 - Data Representation in Computer Systems √
 The fundamentals of numerical data
representation and manipulation in digital
computers.

Converting between various radix systems. √ √
4 
How errors can occur in computations because √ √
of overflow and truncation.
 The fundamental concepts of floating-point
representation.
 Character codes. √ √
 Error detecting and correcting codes.
5 - Boolean Algebra and Digital Logic √ √
 Relationship between Boolean logic and digital
computer circuits.
 Design simple logic circuits. √ √
o How digital circuits work together to form complex
computer system
6 Test I √ √
How digital circuits work together to form complex computer √
system
7 - An Introduction to a Simple Computer √
 Components common to every modern
computer system.
 A simple architecture invented to illuminate
these basic computer concepts, and how it
relates to some real architectures.
o Program assembly process. √ √
8 - A Closer Look at Instruction Set Architectures √ √
 Factors involved in instruction set architecture
design.
 Memory addressing modes.

 Concepts of instruction-level pipelining and its √ √
affect upon execution performance.

9 - Memory Organization √ √
 Registers
 Cache
 Main Memory

 Rigid Disks √ √
 Virtual Memory
 Optical Disk
 Magnetic Tape
10 - Input/output and Storage Systems √
 I/O methods and architectures.
 Storage media, and the differences in their
respective formats.
 RAID systems √
 Emerging data storage technologies
11 - System Software √
 Functions provided by operating systems,
programming tools, database software and
transaction managers
 Role played by each software component in √
maintaining the integrity of a computer system and its
data
12 - Alternative Architectures √
 RISC and CISC architectures.
o Multiprocessor architectures. √
13 - Performance Measurement and Analysis √
 Performance measurement
 Common benchmarks and their limitations.
 Factors that contribute to improvements in
CPU and disk performance.
Test II/ Revision √
Objective: The main objective of this course is to give the student a good knowledge about the computer
Architecture, and the relation between the architecture on the software. This will widen the vision of student in
understanding programs behaviour on the computing systems
Expected Outcomes: At the end of this course, students will be able to
- Understand the concepts and issues involved in the computer architecture
- Conducted critical evaluation of existing and future computer architecture
- Demonstrate proficiency of the instruction set architecture level
- Understand the system organization (processors, memories, and I/O devices)
- Havea moderate knowledge of the assembly language level
- The students will understandof the core of the digital logic level, the micro architecture level
(Compulsory). 6 Credits –(30-10-20).

Prerequisites: There are no prerequisites! You should be able to follow along no matter how little experience you
have in this subject.

COURSE READING LIST:

 Linda N., Julia L., The essentials of Computer organization and Architecture, Jones and Bartlett
Publishers,2003
 Mostafa A., Hesham E., FUNDAMENTALS OF COMPUTER ORGANIZATION AND
ARCHITECTURE, A JOHN WILEY & SONS, INC PUBLICATION, 2005

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy