Question

1. The von Neumann computer has the program stored in the same memory as data. Which...

1. The von Neumann computer has the program stored in the same memory as data. Which computer is not a von Neumann computer?

Pep/9

PDP/8

ENIAC

X86

Homework Answers

Answer #1

ANSWER - ENIAC

Electronic Numerical Integrator and Computer is not based on Von Neumann architecture.

  • ENIAC was introduced on 1946, which is before the introduction or design of stored program computer based on Von Neumann architecture.
  • ENIAC is the first electronic and programmable general purpose large scale computer.
  • It was later set as base for modern days Von Neumann architecture.

So, based on these its not a Von Neumann computer.

The Pep/9, PDP/8, x86 is all based on Von Neumann computer where the program is stored in the same memory as the data.

=================================END================================

Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
How does the Von Neumann architecture allow for data and program instructions to be stored in...
How does the Von Neumann architecture allow for data and program instructions to be stored in the same memory location?
in assembly 1. Real mode allows access to memory below which memory address? 2. Under real...
in assembly 1. Real mode allows access to memory below which memory address? 2. Under real and protected mode, the far jump modifies the current instruction address by changing which register or registers? 3. Under real and protected mode, the near jump modifies the current instruction address by changing which register or registers? 4. Under real mode, briefly explain what happens when the PUSH BX instruction executes. Make sure to show where BH and BL are stored. Assume that initially...
1. Pep/9 has one index register (True / False) 2. The hidden bit in floating point...
1. Pep/9 has one index register (True / False) 2. The hidden bit in floating point is not stored but is always there. (True / False) 3. A machine language program can change itself. (True / False)
Assume a string is stored in memory using Hamming codes that may experience 1 bit errors...
Assume a string is stored in memory using Hamming codes that may experience 1 bit errors per 8 bit ASCII character (12 bit Hamming codes). write the string with explanation? The answer was given on another post which is; 010000110000: C 000001101000: h 000010100110: n 111000001011: r 011100100000: s 110001110011: ( 0000101100101: 00000000101 Please type the line by line explanation.
1. The memory units that follow are specified by the number of words times the number...
1. The memory units that follow are specified by the number of words times the number of bits per word. How many address lines and input/output data lines are needed in each case? (a) 8K X 16 (b) 2G X 8 (c) 16M X 32 (d) 256K X 64 2. Give the number of bytes stored in each memory unit in question 1. 3. Word number 563 decimal in the memory shown in Fig. 7.3 (see Mano-Ch7.pdf) contains the binary...
Suppose a computer using direct mapped cache has 224 bytes of byte-addressable main memory, and a...
Suppose a computer using direct mapped cache has 224 bytes of byte-addressable main memory, and a cache of 128 blocks, where each cache block contains 8 bytes. For four-way set associative cache, to which block of cache the address 0x1895BA maps? Group of answer choices Block 70 Block 16 Block 23 Not enough information
Data Encryption (Strings and Bitwise Operators) Write a C program that uses bitwise operators (e.g. bitwise...
Data Encryption (Strings and Bitwise Operators) Write a C program that uses bitwise operators (e.g. bitwise XOR) to encrypt/decrypt a message. The program will prompt the user to select one of the following menu options: 1. Enter and encrypt a message 2. View encrypted message 3. Decrypt and view the message (NOTE: password protected) 4. Exit If the user selects option 1, he/she will be prompted to enter a message (a string up to 50 characters long). The program will...
A data processing company has a training program for new salespeople. After completing the training program,...
A data processing company has a training program for new salespeople. After completing the training program, each trainee is ranked by his or her instructor. After a year of sales, the same class of trainees is again ranked by a company supervisor according to net value of the contracts they have acquired for the company. The results for a random sample of 11 salespeople trained in the last year follow, where x is rank in training class and y is...
A data processing company has a training program for new salespeople. After completing the training program,...
A data processing company has a training program for new salespeople. After completing the training program, each trainee is ranked by his or her instructor. After a year of sales, the same class of trainees is again ranked by a company supervisor according to net value of the contracts they have acquired for the company. The results for a random sample of 11 salespeople trained in the last year follow, where x is rank in training class and y is...
1. An operating system is a. A resource manager b. A user application such as turbo...
1. An operating system is a. A resource manager b. A user application such as turbo t c. A collection of all software packages on the computer d. Another name of my computer including both hardware and software 2. X86 calling convention is about a. How parameters are transferred through stack b. How interrupt vectors are used to find handlers c. How to make a phone call on an x86 computer d. None of the above 3. Paging mechanisms helps...