wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor and Types

profile
Jeet Ved
Sep 09, 2024
0 Likes
0 Discussions
155 Reads

A uniprocessor is a computer system that has only one central processing unit to perform its tasks. This single CPU handles all process operations and calculations, and executes instructions sequentially, one at a time. This architecture was characteristic of previous computer systems but is still used in simple or embedded systems.


Types of Uniprocessor:

Although the basic concept of a uniprocessor has only one CPU, there are variations depending on configuration and processing of instructions. The main types are:


1.Scalar Uniprocessors:

It is one instruction at a time (in series).

The CPU does not support internal parallelism.

Best for tasks that don’t require high computing power.



2.Superscalar uniprocessors:

It can process multiple instructions per clock cycle.

It uses multiple processing units to execute instructions in parallel within the same CPU.

Examples include modern desktop CPUs that use superscalar architectures to increase performance even though they are technically a single processor array.


3.Pipelined monoprocessor:

It divides instruction execution into several steps, so that stages of multiple instructions can be processed simultaneously.

It helps improve the throughput of the CPU by executing multiple instructions at different stages of the process.



4.CISC  Processor:

It uses complex instructions, where each instruction performs multiple tasks.

CISC uniprocessors can handle tasks with few instructions, but those instructions are much more complex.

Example: Intel x86 processors In basic configuration


Name :Jeet Ved

SapID:53003230116

Div:B


Comments ()


Sign in

Read Next

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

GIS Topography

Blog banner

Cybersecurity Standards for Automotive

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Deadlock

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

CONCURRENCY

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Deadlock

Blog banner

Virtual Machine

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Women Empowerment

Blog banner

File management In Operating System

Blog banner

IoT Architecture Based Security

Blog banner

Ethical Hacking

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

The launch of UniMap by HERE

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Busted : Common Web Security Myths

Blog banner

Direct Memory Access

Blog banner

BENIFITS OF YOGA

Blog banner

Memory Partitioning

Blog banner

Hey Aryan here

Blog banner

Os(Computer security threats)

Blog banner

Importance of Network Security Risk

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Hypothesis Testing in Data Science

Blog banner

Precision-Recall in Data Science

Blog banner

Mumbai famous street food

Blog banner

Socket Programming in Java

Blog banner

How to write a cover letter

Blog banner

Virtual memory

Blog banner

Explain Multiprocessors

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Some web vulnerabilities

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

BUFFER OVERFLOW_142

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Modern operating system

Blog banner