Contents of CD

Total Page:16

File Type:pdf, Size:1020Kb

Contents of CD Contents of CD In CD you have all the source codes of this book, few other tutorials, programming tools and other useful programs. Few of them are sharewares, so if you use them you are supposed to pay the author. The CD includes: • Ralf Brown’s Interrupt List • Alexander Rusell’s Game Programming Guide and other programs • BIOS source codes • Programs for Communication between computers • Compiler creating tools • Device driver kit • Assemblers • Disassemblers • DJGPP – 32 bit compiler • Allegro library • Editor source code • Programs and tools for embedded systems • File Formats Encyclopedia • PC Game Programmers’ Encyclopedia • Graphics programs and tools • Keyboard programs • Music programs • Operating sytems’ source code • Networking libraries • TSR programs and tools • Printer programs • Virus and Anti-virus programs • Novell Netware programs • Useful programming documents • WinZip 8.0 (Shareware Evaluation version) • And many more… “Test everything. Hold on to the good.” First Chapter 1 Greetings. It is a common practice to skip the acknowledgement and book organization. So we have placed them in the First Chapter! Please read this chapter without fail to understand this book better. 1.1 Acknowledgement Throughout the world many people have contributed to this book. We must acknowledge all those good people. We sincerely thank Dr. Dennis M. Ritchie, creator of C language for granting permission to use his photo. Our thanks also goes to Dr. Ralf Brown for providing us his great source—Ralf Brown’s Interrupt List for this book. We must thank Mr. Alexander Russell for his unconditional support to this book. We are proud to thank all the real and international programmers who provided their source code to us. Ms. Lyril Sugitha ([email protected]) helped us a lot to translate this book from “Tanglish” to English! We sincerely thank her as she worked with us even in her tight schedules. I specially thank my mother for her prayers for the success of this project and my father for his support by presenting me a computer. My sincere thanks to my sister Lincy, brother Bensley and my friend Brighton for their encouragement. I benefited greatly from my uncle Azariah, who helped me in finding many useful materials. I thank all my friends and relatives who remembered me in their prayers. K. Joseph Wesley I am grateful to all my friends who are interested in me. I remember all my teachers for their care towards me. I especially thank my Lecturer Mr. Richard Devaraj, American College for his concern towards my career. I must thank Mr. D. Joseph Devadason (Lecturer in Management Studies, American College, [email protected]), one of my good and old friends for helping me to understand English in a better way. Finally, I would like to express my sincere gratitude to my family members who are behind my development: Papa, Amma, Patti, Mama, Mami & Akka. R. Rajesh Jeba Anbiah 1.2 Book Organization Part I - ANSI C 2 A to Z of C Part II - DOS Programming Part III - Advanced Graphics Programming Part IV - Advanced Programming Part V - Mathematics & C Part VI - Algorithms & C Part VII - Illegal Codes Part VIII - Next Step Part IX - Smart Dictionary Part X - Postlude 1.3 FAQ about A to Z of C Q: What do you mean by FAQ? A: FAQ is the acronym for Frequently Asked Questions. So when you read FAQ, most of your questions will be answered! Q: Why have you written this book? A: Because of the dissatisfaction over the existing books on C! Yes. We have lots of books on C, but most of the books do not cover advanced topics and most of the books are priced higher. So we have decided to write a non-profit book and to let the secrets open! We could see many Indian authors who have stolen the works of International Programmers without acknowledging them. So, in our book, we decided to acknowledge those intelligent people. (Many authors had thrust different myths & mistakes directly or indirectly in the minds of Indian C Programmers) Q: What is the user level of this book? A: Intermediate to Advanced Q: What is the category of this book? A: Programming. We’ve got so many ways to solve a single problem. And hence this book also introduces various approaches to solve different problems. Q: To whom have you written this book? A: C lovers, students, programmers, and other enthusiasts. Q: Is this book for students of top level institutions? A: No. We never think that those people are super human beings. Our doctrine is “If you can, then I can! If I can, then you can!” This book is for learners. A to Z of C 3 Q: I want to score more marks in University examination. Will this book help me? A: No. We are dead against the mark-based culture. This book is purely for enthusiasts. This book is written to open many secrets of C. Q: What are the special features of this book? A: This book is not only written by K. Joseph Wesley & R. Rajesh Jeba Anbiah, but many renowned International programmers’ and authors’ materials are also used with permission. The supplement CD got many sources, and utilities. For more details about CD , see “Contents of CD ” Q: How far I can trust source codes of this book? A: We have tested all the codes. Certain source codes of this book are of real programmers. We have used their codes according to their terms. So all codes should logically work! But, obviously there must be some flaws in the approach/solution; the readers are encouraged to find better—alternate solution. Q: Which compiler & IDE you are going to use? A: We have used TC++3.0. And all parts of this book refer the IDE (Integrated Development Environment) TC++3.0 unless otherwise noted. Q: How should I use this book? A: Read all the contents of the book first. Then workout examples and exercises. After gaining confidence, dare to do projects! 1.4 Book Style The book contains “Note” & “Caution” wherever it is necessary. We thought the word “We” would confuse the reader whether it refers “authors & reader” or “K. Joseph Wesley & R.Rajesh Jeba Anbiah (authors)”. So we have decided to use “I” instead of “We” for clarity. And hereafter the word “I” refers “authors (K. Joseph Wesley & R. Rajesh Jeba Anbiah)” and “We” refers “authors & reader”. “Every good tree produces good fruit.” Birth of C 2 C is very often referred as a “System Programming Language” because it is used for writing compilers, editors and even operating systems. C was developed and implemented on the UNIX operating system on the DEC PDP-11, by Dennis M. Ritchie. C was evolved during 1971-73 from B language of Ken Thompson, which was evolved (in 1969-70) from BCPL language of Martin Richards. Dennis M. Ritchie, Creator of C Language Courtesy: Lucent Technologies Timeline Year Language/OS Remarks 1956-63 Assembly Language IBM developed Assembly language 1954-57 FORTRAN (FORmula A team lead by John W. Backus developed a TRANslation) numerically orientated language called FORTRAN 1958 ALGOL(ALGOrithmic An important structured programming Language) language was developed by committee of European and American computer scientists FORTRAN & ALGOL’s type structures later influenced many other languages including BCPL, B & C 1964 PL/I (Programming IBM developed a clean language intended for Language 1) both business and scientific purposes 1965 The famous “Multics project” was started by MIT, Bell Labs & General Electric as a joint venture. Multics (Multiplexed Information and Computing Service) is an experimental Operating System. It was the first operating system written in a high level language namely PL/I TMG McClure developed TMG as a language for (TransMoGrifiers) writing compilers A to Z of C 5 Year Language/OS Remarks 1967 BCPL (Basic Martin Richards wrote BCPL, while he was Combined visiting MIT Programming Language) Dennis M. Ritchie joined Bell Labs 1969 Bell Labs pulled out of the Multics project because of lack of hardware support PL/I was proved to be inefficient with Multics project. Ken Thompson & Dennis M. Ritchie felt that BCPL was also inefficient, who were using BCPL in Multics project too. Unix Ken Thompson wrote original Unix system in PDP-7 assembler McIlroy and Bob Morris used TMG to write PL/I compiler for Multics 1969-70 B Challenged by McIlroy's feat in reproducing TMG, Ken Thompson wrote a system programming language called B B is a BCPL squeezed into 8k bytes of memory. One theory says that B’s name is derived from BCPL. But other theory says B’s name is a contraction of Bon, another language created by Ken Thompson during Multics days. Bon is thought to be named after Bonnie, Ken Thompson’s wife. B compiler on PDP-7 did not generate machine code instructions, instead generated ‘threaded code’ 1971 NB (New B) Dennis M. Ritchie began to rewrite B’s compiler to generate PDP-11 machine instructions. He also added character types to B for brevity. At the early stage he called it as NB (New B) 1971-73 C Dennis M. Ritchie added few more features to NB and C was born 1973(summer) AT&T scientists rewrote Unix kernel in C. That incident added popularity to C 1978 Brian Kernighan & Dennis M. Ritchie wrote “The C Programming Language”, the first authoritative book on C. This book is often nicked as “K&R” or “white book” 1977-1979 C has undergone few more changes when Unix system’s popularity was demonstrated 6 A to Z of C Year Language/OS Remarks 1983 ANSI established X3J11 committee to standardize C language 1979-1983 C++ Bjarne Stroustrup wrote C++, an object oriented language at AT&T Bell labs.
Recommended publications
  • Communication Theory II
    Microprocessor (COM 9323) Lecture 2: Review on Intel Family Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt Feb 17th, 2016 1 Text Book/References Textbook: 1. The Intel Microprocessors, Architecture, Programming and Interfacing, 8th edition, Barry B. Brey, Prentice Hall, 2009 2. Assembly Language for x86 processors, 6th edition, K. R. Irvine, Prentice Hall, 2011 References: 1. Computer Architecture: A Quantitative Approach, 5th edition, J. Hennessy, D. Patterson, Elsevier, 2012. 2. The 80x86 Family, Design, Programming and Interfacing, 3rd edition, Prentice Hall, 2002 3. The 80x86 IBM PC and Compatible Computers, Assembly Language, Design, and Interfacing, 4th edition, M.A. Mazidi and J.G. Mazidi, Prentice Hall, 2003 2 Lecture Objectives 1. Provide an overview of the various 80X86 and Pentium family members 2. Define the contents of the memory system in the personal computer 3. Convert between binary, decimal, and hexadecimal numbers 4. Differentiate and represent numeric and alphabetic information as integers, floating-point, BCD, and ASCII data 5. Understand basic computer terminology (bit, byte, data, real memory system, protected mode memory system, Windows, DOS, I/O) 3 Brief History of the Computers o1946 The first generation of Computer ENIAC (Electrical and Numerical Integrator and Calculator) was started to be used based on the vacuum tube technology, University of Pennsylvania o1970s entire CPU was put in a single chip. (1971 the first microprocessor of Intel 4004 (4-bit data bus and 2300 transistors and 45 instructions) 4 Brief History of the Computers (cont’d) oLate 1970s Intel 8080/85 appeared with 8-bit data bus and 16-bit address bus and used from traffic light controllers to homemade computers (8085: 246 instruction set, RISC*) o1981 First PC was introduced by IBM with Intel 8088 (CISC**: over 20,000 instructions) microprocessor oMotorola emerged with 6800.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Programmation Utilisant Les Interruptions Du Syst`Eme D’Exploitation : Le Cas De MS-DOS
    Programmation utilisant les interruptions du syst`eme d’exploitation : le cas de MS-DOS Patrick C´egielski Janvier 2019 Pour Ir`ene et Marie Legal Notice Copyright c 2019 Patrick C´egielski Universit´eParis XII – IUT de S´enart-Fontainebleau Route foresti`ere Hurtault F-77300 Fontainebleau [email protected] iv Table des mati`eres Pr´eface ix 0.1 Bibliographie ...................................... x 1 Lesgrandesfonctionsd’unsyst`emed’exploitation 1 1.1 Etudeg´en´erale´ ..................................... 2 1.1.1 Les deux tˆaches d’un syst`eme d’exploitation . .... 2 1.1.2 Principe des syst`emes d’exploitation . 3 1.2 CasdeMS-DOS .................................... 5 1.2.1 Mod`eleentroiscouches ............................ 5 1.3 Historique........................................ 6 1.4 Bibliographie ...................................... 9 I Le syst`eme d’exploitation comme machine virtuelle 11 2 Programmer avec le DOS 13 2.1 Lesentr´ees-sortiesstandard . ....... 14 2.1.1 Fonction 02h d’affichaged’uncaract`ere . 14 2.1.2 Fonction 01h desaisied’uncaract`ereavec´echo . 15 2.1.3 Fonction 08h desaisied’uncaract`eresans´echo . 17 2.1.4 Saisie d’une chaˆıne de caract`eres . .. 17 2.2 L’interruption 33h de manipulation de la souris . 18 2.2.1 Fonction 00h d’initialisation de la souris . 18 2.2.2 Fonctions 01h et 02h d’affichage et de transparence du pointeur . 18 2.2.3 Fonction 03h de r´ecup´eration de la position du pointeur . 19 2.2.4 Fonction 04h ded´eplacementdupointeur . 20 2.3 Fonction 05h d’impression............................... 21 2.4 Lesyst`eme ....................................... 22 2.4.1 Fonction 2Ah d’obtentiondeladate ..................... 22 2.4.2 R´ecup´eration de l’heure .
    [Show full text]
  • Swsoft Gewinnt Ex-Microsoft-Systemarchitekten Als Senior Technical Advisor
    SWsoft gewinnt Ex-Microsoft-Systemarchitekten als Senior Technical Advisor Mark Zbikowski kommt mit Expertenwissen über Windows- Systemprogrammierung zum Unternehmen für Virtualisierungs- und Automatisierungssoftware Darmstadt, 17.01.2008. – SWsoft vermeldet einen prominenten neuen Berater: Mark Zbikowski, ehemaliger Systemarchitekt bei Microsoft und einer der Pioniere der Softwareentwicklung überhaupt, wird für das Unternehmen als Senior Technical Advisor tätig. In dieser Funktion wird er SWsoft unterstützen, indem er das Entwicklungsteam und die Führungskräfte berät. Während seiner Zeit bei Microsoft leitete Zbikowski MS-DOS-, OS/2-, Cairo- und NT-Projekte. Im Jahre 2006 wurde er für seine 25 Dienstjahre in der Firma geehrt und war der erste Mitarbeiter - nach Bill Gates und Steve Ballmer - der diese Karrieremarke erreichte. Zbikowski entwarf das Dateiformat der „EXE“-Programme unter MS-DOS; seine Initialen „MZ“ zieren bis heute die Kopfdaten dieses Formats für ausführbare Dateien. Er war ein wichtiger Designer und Entwickler für das gängigste Dateisystem Windows NTFS. Heute lehrt Zbikowski an der University of Washington, nachdem er im Juni 2006 bei Microsoft ausgeschieden war. Er besitzt einen von Harvard verliehenen Bachelor-Grad in angewandter Mathematik und einen Master-Abschluss von Yale. "Die Unternehmenskultur bei SWsoft erinnert an die aufregenden Anfangsjahre von Microsoft – eine junge Firma voller Energie und mit riesigen Chancen, die Veränderungen wesentlich mitzugestalten, die es im Einsatz der Informationstechnologie zum Nutzen von Verbrauchern und Unternehmen überall auf der Welt geben wird“, sagt Zbikowski. „Ich freue mich sehr auf den Beginn meiner Mitarbeit an SWsofts kontinuierlicher Entwicklung von Weltklasse-Software für Virtualisierung, Management und Automatisierung.“ “Marks Erfahrungen mit der Erstellung von Systemkomponenten für die meistverbreitete Software weltweit – Microsoft Windows – sind von großer Bedeutung für unsere Arbeit", so Serguei Beloussov, CEO bei SWsoft.
    [Show full text]
  • Portable Executable מאת Spl0it
    Portable Executable מאת Spl0it הקדמה - מה זה PE? ויקיפדיה: "PE )קיצור של Portable Executable( הוא פורמט שפותח ע"י Microsoft עבור קבצי ריצה, קבצי אובייקט, ספריות קישור-דינמי )DLL(, קבצי פונטים )FON( ועוד אשר משומשים בגרסאות ה32- וה- 64 ביט של מערכות המשתמשות במערכת ההפעלה PE .Windows הוא מבנה נתונים אשר מקבץ את המידע ההכרחי בשביל שה-Loader של Windows יצליח לנהל את הקוד בזמן ריצה". סוגי הקבצים הנפוצים ביותר המשתמשים בפורמט PE: exe - קובץ ריצה dll - ספריית קישור-דינמי sys/drv - קובץ מערכת )דרייבר לקרנל( ocx - קובץ שליטה ב-ActiveX cpl - לוח בקרה scr - שומר מסך הערה: לקבצי lib. )ספריות סטטיות( יש פורמט שונה, לא PE. מערכת ההפעלה Windows עושה שימוש בקבועים הנ"ל כדי לייצג גדלים של משתנים: גודל טיפוס בית CHAR (Character) 1 2 בתים WORD 2 בתים (SHORT (Short Integer 4 בתים (DWORD (Double Word 4 בתים (LONG (Long Integer 8 בתים (QWORD (Quad Word 8 בתים LONGLONG כלים לחקירת ה-PE: PEView - לטובת הסתכלות על ה-PE של קבצים בפורמט זה CFF Explorer - אותו דבר, אך עם פיצ'רים נוספים כגון עריכת ה-PE בהקסדצימלי והמרת הקובץ לשפת אסמבלי WinDbg - עבור ניפוי שגיאות )Debugging( בסיסי פורמט ה-PE נראה כך )התמונה ממוספרת כדי שההסברים בהמשך המאמר יהיו ברורים יותר. לתמונה "נקייה" יותר, לחצו כאן(: Portable Executable www.DigitalWhisper.co.il גליון 90, ינואר 2018 2 DOS-Header המבנה הראשון, הנמצא ב-0x0 Offset, נקרא DOS-Header והוא נראה כך )מספר 1 בתמונת פורמט ה- :)PE הערה להמשך המאמר: שדות המסומנים בכחול הם שדות שחשובים לנו. לא אוכל לכסות את כלל השדות במאמר זה, לכן אכסה רק את השדות החשובים.
    [Show full text]
  • Writing Secure Code Code
    spine = 1.82” ”During the past two Proven techniques from the security experts to decades, computers have revolutionized the way we live. help keep hackers at bay—now updated with BEST PRACTICES They are now part of every lessons from the Microsoft security pushes BEST PRACTICES critical infrastructure, from Hackers cost countless dollars and cause endless worry every year as they attack secure software telecommunications to banking DEVELOPMENT SERIES to transportation, and they networked applications, steal credit-card numbers, deface Web sites, and slow network SECURE CODE WRITING contain vast amounts of sensitive traffi c to a crawl. Learn techniques that can help keep the bad guys at bay with this SECURE CODE WRITING data, such as personal health and entertaining, eye-opening book—now updated with the latest security threats plus WRITING fi nancial records. Building secure lessons learned from the recent security pushes at Microsoft. You’ll see how to padlock software is now more critical than your applications throughout development—from designing secure applications ever to protecting our future, and to writing robust code that can withstand repeated attacks to testing applications every software developer must for security fl aws. Easily digested chapters explain security principles, strategies, learn how to integrate security and coding techniques that can help make your code more resistant to attack. The into all their projects. Writing authors—two battle-scarred veterans who have solved some of the industry’s toughest SECURE Secure Code, which is required security problems—provide sample code to demonstrate specifi c development Second Edition reading at Microsoft and which techniques.
    [Show full text]
  • ACSC 372 – Systems Programming
    File / Directory Manipulation ACSC 372 – Systems Programming Creating Directories Command mkdir <directory> Removing Directories Command rmdir <directory> Lecture 3: Introductory UNIX commands II Removes an empty directory 2 File / Directory Manipulation (cntd) File / Directory Manipulation (cntd) Copying Files Moving Files Command cp (options -i, -r) Command mv (option -i) Makes a copy of a file Moves a file from one location to a new location usage: cp <Source> <Destination> usage: mv <Source> <Destination> Option -i Option -i Asks if you want to write over a file that already exists Asks if you want to write over a file that already exists Option -r Recursively, will copy all files and subdirectories Used also as a rename command 3 4 File / Directory Manipulation (cntd) Examining Files Removing Files Command rm (options -i, -f, -r) Everything in UNIX is a file Removes a file Different files have different uses usage: rm <filename(s)> How do you tell what type a file is? Option -i Command file Verify the delete Examine file types Option -f Force the removal of a file Not 100% accurate. Overrides the -i flag It is based on a combination of the permission codes of the file, the name of the file, and an analysis of the first lines of option -r the file. Recursively, delete all files and directories 5 6 Examining Files (cntd) Examining Files (cntd) Examination Mechanism bash-3.1$ file test/ http://en.wikipedia.org/wiki/Magic_number_(programming) Compiled Java class files (bytecode ) start with 0xCAFEBABE on big-endian systems. test/: directory GIF image files have the ASCII code for 'GIF89a' (0x474946383961) or 'GIF87a' (0x474946383761) JPEG image files begin with 0xFFD8FF, and JPEG/ JFIF files contain the ASCII code for 'JFIF' (0x4A464946) or JPEG/ EXIF files contain the ASCII code for 'Exif' (0x45786966) beginning at byte 6 in the file, followed by more metadata about the file.
    [Show full text]
  • Operating Systems Principles and Practice, Volume 4
    Operating Systems Principles & Practice Volume IV: Persistent Storage Second Edition Thomas Anderson University of Washington Mike Dahlin University of Texas and Google Recursive Books recursivebooks.com Operating Systems: Principles and Practice (Second Edition) Volume IV: Persistent Storage by Thomas Anderson and Michael Dahlin Copyright ©Thomas Anderson and Michael Dahlin, 2011-2015. ISBN 978-0-9856735-6-7 Publisher: Recursive Books, Ltd., http://recursivebooks.com/ Cover: Reflection Lake, Mt. Rainier Cover design: Cameron Neat Illustrations: Cameron Neat Copy editors: Sandy Kaplan, Whitney Schmidt Ebook design: Robin Briggs Web design: Adam Anderson SUGGESTIONS, COMMENTS, and ERRORS. We welcome suggestions, comments and error reports, by email to [email protected] Notice of rights. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form by any means — electronic, mechanical, photocopying, recording, or otherwise — without the prior written permission of the publisher. For information on getting permissions for reprints and excerpts, contact [email protected] Notice of liability. The information in this book is distributed on an “As Is" basis, without warranty. Neither the authors nor Recursive Books shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information or instructions contained in this book or by the computer software and hardware products described in it. Trademarks: Throughout this book trademarked names are used. Rather than put a trademark symbol in every occurrence of a trademarked name, we state we are using the names only in an editorial fashion and to the benefit of the trademark owner with no intention of infringement of the trademark.
    [Show full text]
  • Writing Secure Code / Michael Howard, David Leblanc
    Copyright 2002 by Microsoft Corporation PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2002 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Cataloging-in-Publication Data Howard, Michael, 1965– Writing Secure Code / Michael Howard, David LeBlanc. p. cm. ISBN 0-7356-1588-8 1. Computer security. 2. Data encryption (Computer science) I. LeBlanc, David, 1960– II. Title. QA76.9.A25 H698 2001 005.8--dc21 2001044546 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWE 6 5 4 3 2 Distributed in Canada by Penguin Books Canada Limited. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 706-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to [email protected]. Active Directory, ActiveX, Authenticode, Hotmail, Jscript, Microsoft, Microsoft Press, MS-DOS, MSDN, Visual Basic, Visual C++, Visual Studio, Win32, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious.
    [Show full text]
  • Determi:Ning Processor Types
    Chapter 15 Determi:ning Processor Types There are number of utility programs on the market today which can tell you about the configuration of a PC. This information can include the amount of available RAM, the running DOS version and the type of processor the PC has. This information can be very useful for developing programs in high level languages, since code generation can be adapted to the particular processor. For example, both Microsoft C and Turbo C allow special code generation for the 8088, the 80286 and the 80386, which makes full use of the capabilities of the particular processor and instruction sel This can dramatically improve performance for programs which work with large groups of data. One way to take advantage of this would be to compile the program once for each of the three processor types. Then a program could be developed to serve as the boot for the actual program. This boot program would determine the type of processor being used and load the main program version most compatible with the processor. Which processor is which? This raises the question of how to determine which type of processor is being used, since unlike other configuration information, we cannot find this out by making a BIOS or DOS call. Unfortunately, there is no machine language instruction which instructs the processor to reveal its identity, so we have to use a trick. This trick relies on a condition which, according to a few hardware manufacturers, is totally impossible. This is a test which involves the different ways the various processors execute certain machine language instructions.
    [Show full text]
  • Software-Defined Computer with a Classic Microprocessor
    186 Measurement Automation Monitoring, May 2017, no. 05, vol. 63, ISSN 2450-2855 Julia KOSOWSKA, Grzegorz MAZUR INSTITUTE OF COMPUTER SCIENCE, WARSAW UNIVERSITY OF TECHNOLOGY 15/19 Nowowiejska St., 00-665 Warsaw, Poland Software-Defined Computer with a Classic Microprocessor Abstract easily supported in future versions. The microprocessors considered included the MC6800, Intel 8085, Intel 8088/NEC V20, 65C02 and The paper describes the concept and the design process of a software- Motorola MC68000/MC68010. Finally the possibility of building an defined computer built for didactic purposes and as a proof-of-concept. Intel 8080-based version was also evaluated to commemorate the fact The computer uses a classic microprocessor from the 1980s with all of its other components – memory, I/O, supplementary glue logic and that an 8080A clone named MCY7880 was the only microprocessor a hardware bus monitor implemented with a contemporary mainstream ever produced in Poland. microcontroller with Cortex-M family core. The concept of a software- defined computer was successfully implemented with four significantly 3. Known similar projects different microprocessors. The computer may be used for illustrating the operation of a processor and for teaching the basics of low-level During the implementation of our design, two similar designs programming. It is also capable of running CP/M operating system. Its operation is controlled at both hardware and software level from a PC via were published on the web by Jac Goudsmit. Both use the WDC two instances of a terminal emulator software. W65C02S with the Parallax Propeller microcontroller emulating some other parts of the computer.
    [Show full text]
  • Parallel Processing This Issue We Have Three Articles on the Transputer, a Processor Specially Designed for Parallel Processing
    No. 38 Nov./Dec.1987 $3.95 THE M CR 0 T E C H N CAL J 0 URN A L Parallel Processing This issue we have three articles on the transputer, a processor specially designed for parallel processing. The articles cover the transputer, communications between transputers, and creating a parallel C compiler. Series begins on page 6 Laser Printers, Typesetters .' I And Page Definition Languages page 20 The problems designers (and purchasers) face getting information onto paper. Magic In The Real World page 28 What can you do with a $20 PC parallel card? A lot! Bruce tells you how. Build A Graphics Scanner For $6.00, Part 2 page 42 This time, John covers the hardware construction and begins the software. In Depth Turbo C · page 56 Writing a resident-program extractor entirely in C. I o 7 '''''''I'''I'U'L.I:6ne;r~: ~ltie;'high~s(,<:;,:·· ,: •.• ;~:.p,~rfofmance·aJld,:fntegration ·.of !;~t;.ahY:: PC/XT compatible. With its jS::: ;,'1()M Hz,· zero wait state . 'operation it walks away from AT compatibles as well. On board is one megabyte of DRAM, a real time clock, floppy disk controller, and optional one or two serial ports, SCSI port and 8087. The PC Tech SmartBIOS provides PC compatability with ease of use. We wrote it and we support it! PRICES! i#';"Ma\H~'¢o~r~cessor for X16B ::,::JheX16:8087 Math Coprocessor runs at full CPU speed. That's X16B I 1 Meg I RTC .... $600.00 ;:;;,r:;,10MHzofnumber smashing power! The Math Coprocessor on the 8 M Hz version .....
    [Show full text]