particularly clear, the knowledge of the summary is basically the Shang students of the blog to learn it again. After that will not be done in front of the experiment to fill up, but also a lot of knowledge before reviewing.Their own lack ofI feel that my lack or lazy, too lazy to read, lazy hands, lazy brain. As the teacher said, I don't have the words to look up the dictionary, because I do not bother to check. But this kind of mentality treats the study, that is equal to cannot learn the thi
achieved.For example, Addl $4,%ecx in the X86 directive, because the ADDL directive in Y86 does not contain an immediate number, the Y86 needs to deposit the immediate number into the register, that is, using the IRMOVL instruction, and then using ADDL to handle the addition operation.In general, Y86 is a X86 version of the compact that is designed to implement a processor in a simple structure that helps us understand the design and implementation o
2018-2019 20165227 "Information Security system Design Fundamentals" The third week to learn to summarize learning objectives
Understanding the concept of reverse
Master X86 compilation base, able to read (reverse) Assembly code
Understanding ISA (Instruction set architecture)
Understand the concept of function call stack frames and can debug with GDB
Learning tasks
What y
the experiment process, the understanding of the knowledge point in the experiment instruction book.
(1) Linux porting?The so-called Linux migration is the Linux operating system for the specific target platform to do the necessary rewriting, installed on the target platform to make it run correctly.
The problems encountered during the experiment and the solutions.
(1) The image cannot b
Purple Book title:Test instructions: let you design a lighting system that gives you n bulbs, each with a voltage, a power supply, the cost per bulb, and the quantity required for each bulb. Each bulb requires a different power supply, where a large voltage bulb can replace a small lamp with a low voltage, requiring minimum costThe following: Each type of voltage
address addressing, relative base address addressing, proportional addressing mode, base address proportional address mode, and relative base address proportional addressing modeV. directivesmov--transmitting dataadd--Plussub--minusimul--Multiply (signed)xor--XORor--orand--andleal--delivery addressinc--Plus Onedec--minus Oneneg--take negative?not--to take the supplement?Sal (SHL)--shift leftsar--Arithmetic Right Shiftshr--Logical Right Shiftloop--CycleJump instruction: SlightlySix, the flag bit
1
Experiment contents, steps and experience:
The understanding of the experiment process, the understanding of the knowledge point in the experiment instruction book.
(1) The concept of multithreading? Why do you want to propose multithreading?In a program, these stand-alone program fragments are called "threads", and the concept of programming with it is known as "multithreading." Use multi-threading to improve applicat
20165230 2018-2019-1 "Information Security system Design Fundamentals" The second week study summary of learning Contents
There are two general rules for arranging the bytes of an object: The small-end method (least significant byte at the front) and the big-endian (the most significant byte in front).
The expression x>>k will shift the X arithmetic right to K (the left side complements the K-effectiv
20145235 "Information Security system Design Fundamentals" No. 09 Week Study summary _1 Exercise 10.1The first problem is usr/include inside no csapp.h and csapp.c downloaded a compressed package from the night, and to understand the pressure tar-xf Code.tarThen put the inside of the Csapp.h and csapp.c into the usr/include inside.Then compile and run c101.c. The descriptor return value is 3.Code HostingImp
of my reading notes, life impressions, current affairs discussion and even open the brain hole, this kind of thing really suitable to send to the blog? After all, send to let the teacher see the things students are also can see, feel what the heart of what things let others see feel good shame ah.What do you think the teacher of this class should continue to do? The teacher has always been a good teacher, which I believe. So I should go on, except that I don't think I should continue.What do yo
and the number of cylinders in a disk is generally the same relationship? Because in the exercise, they are replaced directly with each other.Problem two, the simple way to estimate disk access time is to take the seek time by 2, but in exercise 6.3, so that the results of 16ms and the actual result 10ms difference is very large?Harvest and experience:This time the homework is completed the longest time, spent three days, finally read the book carefu
email carefully-do not send an email to many people, and expect everyone to read it carefully to find out what you expect him to do.
Bad email features
1. Writing prose is long and boring, and people are expected to read it-this is unrealistic.
2. The focus is not prominent. Instead, it relies on the recipient to extract key information: time, action, and goal.
3. mass mailing leads to no targeted mail-the opinion in the book "influence" will lead
Summary of learning contents of textbookIn a simple model, the memory system is a linear byte array, and the CPU can access each memory location within a constant time. In fact, a memory system is a hierarchical structure of storage devices with different capacity, cost, and access times. Some of the contents of the book I will not repeat, just need to summarize
The computer in the end is how to run it, in my study of the computer has not been very clear, but recently borrowed this "the Art of Linux kernel design" is to know what the computer from the boot to start the operating system between what exactly do.This book has just started to introduce not Linux startup, but a step before the Linux boot, that is, after you p
-feeling bad, read a lot of confusion, code execution is also less. This week's code package gives me a good chance to practice understanding! So I just took the code out of the video in handy. The feeling learned a lot of content. In particular, the function of fork such functions are in the execution of the code to feel its principle. It was really touching when I finished it!!!Because there is also a recent project of this course, the internet also searched a lot of communication between the
default cache type by calling the following API. setbuf, SetvbufSetvbuf can accurately describe the type of cache. Fclose The stream is also flushed when the stream is closed. when a process terminates normally (calling exit directly or returning from the main function), all standard I/O streams with non-writable cached data are flushed and all open standard I/O streams are closed. problems encountered(1) Key differences between standard I/O and unix I/OReferences(1) Textbook in-depth understan
.
Connect to I/O Devices: Universal Serial Bus (USB), graphics card, Host bus adapter
To access the disk:
SSD: The SSD packet is plugged into the I/O bus. An SSD package consists of one or more flash chips and a flash translation layer, instead of a mechanical drive in a traditional rotating disk. SSDs consist of semiconductor memory with no moving parts, so the random access time is faster than rotating the disk, consumes less energy, and is more robust. But easy to wear.
Different stor
Machine learning goals: Let machines learn to complete tasks through several instances.
Statistics is a field that machine learning experts often study.
The machine learning method is not a waterfall process. It needs to be analyzed, explored, and tried repeatedly.
Python is considered a very effective modeling language.
One idea is that algorithms are not the most time-consuming, and the time-consuming is:
1. Read and clean data.
2. explore and understand input data.
3. analyze how to best pres
) or positive (s=0), and the sign bit with the value 0 is interpreted as a special case.Mantissa: M is a binary decimal order: E is weighted against floating-point numbers and can be negativeFloat:s=1 bit, exp=8 bit, frac=23 bitDouble:s=1 bit, exp=11 bit, frac=52 bit2. Integers and floating-point numbers indicate the relationship of the same number:P74: The relative region corresponds to the low of the integer, just before the highest significant bit equal to one stop, and a floating point repre
)That is, the number is rounded up or down, and the lowest valid number of the result is even.Can be used in binary decimals.2. Rounding to 0That is, rounding down integers and negative numbers rounded up.3. Rounding DownBoth positive and negative numbers are rounded down.4. Rounding upBoth positive and negative numbers are rounded up.Iv. floating-point arithmetic 1. floating-point addition
Floating-point addition is exchangeable
Floating point addition not binding
The floating-
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.