Monday, September 30, 2019

Analysis of Sonny’s Blues by James Baldwin

â€Å"Sonny’s Blues† by author James Baldwin tells the tale of two brothers; one good and one evil. The narrator paints the two brothers as â€Å"light† and â€Å"dark†. The author James Baldwin writes about his relationship with his brother Sonny whom was the â€Å"dark† brother. In essence, this story is about the struggle of two black brothers growing up in Harlem. This essay incorporates the struggles that Black men and women go through on a daily basis. Though both brothers were from the ghetto, the narrator seems to have assimilated into the larger society/culture; he was a school teacher doing generally well in what we call life. Sonny on the other hand turned to drugs (heroin) to escape from the pain and suffering he endured growing up a black man in the 1950’s. â€Å"Sonny’s Blues† also tells the reader about how art and music was a huge part of Black people’s lives in Harlem. Many looked towards music for an escape; Sonny turned towards Jazz to release his pain and anguish. This story does have a Biblical theme behind it. Like the story of light and darkness in the Bible, Baldwin uses these phrases to reference the life or the characters. One critic agrees with this Biblical interpretation; author James Tackach actually wrote a criticism called â€Å"the biblical foundation of James Baldwin’s â€Å"Sonny’s Blues†Ã¢â‚¬â„¢. Tackach’s interpretation was based on Baldwin’s real life. He expressed that Baldwin was born in the Church and therefore knew the Bible intimately. Tackach fells as though Baldwin uses his vast knowledge of Biblical stories to help tell the tale of Sonny and his brother. In Tackachs critical analysis of â€Å"Sonny’s Blues†, he writes that no other critical analysis has identified the two main biblical texts that form the foundation of Baldwin’s story; the Cain and Abel story and the story of the Prodigal Son. In accordance with Tackachs criticism, I believe that that story did have a Biblical undertone like the two stories listed above. Both stories, Cain and Abel and The Prodigal Son, have the same plot as â€Å"Sonny’s Blues†. All of these stories are brothers fighting with one another and each brother in all of three stories has the â€Å"good† and the â€Å"bad† qualities about them. Like previously stated, Sonny was the good brother; so were the Prodigal son and Cain. Tackach also talked about the â€Å"cup of trembling† which was a Biblical term that symbolizes sinners that were now redeemed. When the narrator sends Sonny a drink at the end of the story, he claims that it is like the â€Å"cup of trembling†. This is another term taken from the Bible to symbolize the relationship between the two brothers. Tackach seems to use biographical and historical criticism when breaking down the story of â€Å"Sonny’s Blues†. Like Tackachs, Michael Clark’s criticism ‘Light and Darkness in â€Å"Sonny’s Blues†Ã¢â‚¬â„¢ also uses the â€Å"light† and â€Å"darkness† to describe the story. The â€Å"light† being the ‘good’ and the â€Å"dark† being the ‘bad’ qualities. Unlike Tackachs, Clark uses these terms to refer to the emotions felt by Sonny when he was on drugs, thinking about his life or when playing his piano; his jazz music. In â€Å"Sonny’s Blues†, the narrator writes â€Å"I feel like a man who’s been trying to climb up out of some deep, real deep and funky hole and just saw the sun up there, outside. I got to get outside. † Clark uses the â€Å"funky hole† to describe the darkness and â€Å"the sun† to describe the light. To Clark, the whole story is about how Sonny feels and how his music portrays his emotions, his despair and finally his joy. I agree with Clark, It seems as though Sonny is always in pain or joyous. There seems to be no in between with him. Most of the time, Sonny is depressed or melancholy. He only finds real happiness in the last few sentences of the story. Sonny only expressed his joy when he is clean and playing his beloved piano. This did occur in the beginning of the story too, when Sonny moved into Isabelle’s house. Isabelle had a piano inside and Sonny seemed very happy to know this. Sonny played jazz music all the time until Isabelle and her family received a note saying that Sonny was missing school. After Sonny was scolded, he stopped playing the piano and began his journey through the darkness. He continued this until the end of the story when he finally kicked his habit. The â€Å"light† and the â€Å"darkness† analogy Clark used were perfect for this story because it captured the struggles Sonny went through, throughout the short story.

Sunday, September 29, 2019

Drexler’s Bar-B-Que

ENVIRONMENT OUTPUTS PROCESS INPUTS | 3. Apply the systems model to illustrate how Drexler’s Bar-B-Que operates within its environment. Before applying the system model to Drexler’s, first we will discuss a little bit about the system theory itself. The organization itself is an element of a larger system, the environment. Within time, every organization takes, processes and returns resources to the environment. The decisive factor of organizational effectiveness is whether the organization survives in the environment.In simpler meaning, systems theory is when an organization takes resources (inputs) from the larger system (the environment), processes the resources and returns them in a changed form (output). Input – Mrs. Scott talks to her customers, new and old, about what they are looking for within the restaurant. Process – Mrs. Scott gathers and analyzes the customers’ suggestions. Output – Mrs. Scott implements her action plan and the en vironment (customers) receive the service they suggested. This process is basically a revolving system to improve customer service and business activity. Due to Mrs.Scott’s actions, she has closed down the restaurant and upgrade to a bigger building to accommodate her new and regular customers. Managers need to possess two key ingredients: authenticity and social intelligence Mrs. Scott possess both of these assets because she makes sure that Drexler’s menu is the same with the same ingredients, she makes sure that the restaurant is original in its deliverance. She also knows that to be successful she needs her customers’ input to keep them coming back for more. There are 5 dimensions of social intelligence: Â   empathy, presence, situational radar, clarity and authenticity which Mrs. Scott all possesses.

Friday, September 27, 2019

Essay Example | Topics and Well Written Essays - 250 words - 67

Essay Example Another very admirable feature of the behavior of Germans is the respect of the younger for the elders. German children respect their parents a lot which lays the foundation of a strong family system in Germany. The young ones spend time with the elders, seek advice from them and try to benefit from their experience and wisdom. Germans also â€Å"respect foreign cultures and learn their languages† (Bernstein 45). On the other hand, Americans are more focused upon equality of rights and individual’s freedom irrespective of age difference. They are not quite as particular as Germans about showing reverence for their elders while communicating with them. American youth tends to cultivate a culture of friendship with the elderly and since equality is one of the fundamentals of friendship, the young ones tend to approach the elderly as their parallels. Unlike the Germans, the Americans don’t make much effort to learn the foreign languages. Instead, the foreigners ente ring America learn the Americans’

GEOGRAPHIC INFORMATION SYSTEMS (GIS) Essay Example | Topics and Well Written Essays - 1000 words

GEOGRAPHIC INFORMATION SYSTEMS (GIS) - Essay Example This, through my lasting experience and interaction with various GIS software, I believe can be achieved at relatively low cost than expected. Using the GIS information in transportation, I believe can be of great help to city planning and organization. In respect to this, I can assure you the effective use of the following GIS applications in doing the following activities with the aim of restoring order and cost in the city. The GIS tool can be used in spatial analysis to locate areas of preference for various development activities at relatively lower costs compared to the other software. High costs are often incurred while constructing bridges, railway lines and roads within the city and beyond, especially when other tools are used in designing these channels. However, using GIS, we can analysis the spatial characteristics of the regions to be bypassed by these projects for reduced cost of construction. For instance, it is easier to design the routes for road, railways and water pipes construction by developing different elevation models on the GIS software. Assessing and accurately analyzing this data can then help us in coming up with the correct route for construction with minimum costs involved. In order to illustrate this using an example, it is often very difficult to construct roads and railway lines where the process has to involve cutting through a mountain or in a region with rugged terrain. in such Cases, many culverts and bridges, have to be constructed as these increases the costs of construction. By overlaying the elevation data on the GIS software, we can easily locate the various points to be avoided by the project, calculate the relative distance and costs involved and compare the results for better decision making before the actual process. This aids in proper planning and management of funds are hence very

Thursday, September 26, 2019

Frankenstein by Mary Shelley Essay Example | Topics and Well Written Essays - 750 words

Frankenstein by Mary Shelley - Essay Example The plot of the story plays a significant role in presenting the gothic aspect of the novel. Frankenstein succeeds in his aim when he creates a human, but when sees the outcome of his experiment, he is utterly disappointed. When the live human comes out of the machine his monster like appearance makes Victor to abhor his creation. â€Å"When I thought of him, I gnashed my teeth, my eyes became inflamed, and I ardently wished to extinguish that life which I had so thoughtlessly made.† (Shelly 100). The monster disappears and then reappears in Geneva killing Victor's brother, William Frankenstein and that sets off a series of killings, leading to a tragic end for all characters. Victor creates a female or romantic companion for the Monster, so they can live together. However, he kills that female companion, fearing about the repercussions of that creation. Monster as a form of revenge cut shorts Victor’s romance by killing his lover and bride, Victoria on the wedding nigh t. Thus, the romance of both Victor and Monster faces violent and tragic ends, due to the actions of each other. The existence of supernatural being in the form of Monster and its destructive powers which results in the tragic end to the romantic affairs of both the Monster and Victor, brings forth the elements of gothic romance. The other gothic convention utilized in the novel is the gloomy manner in which the nature is depicted. The descriptions of natural settings throughout the novel follow the genre of Gothic Romance. When Victor decides to bring an end to the ruin caused by the monster created by him, he follows the monster in the icy regions of the Arctic. In course of his chase, the nature is described by him and the monster in a way which terrifies the human mind.   The monster’s inscriptions in the bark of the trees reveal the extreme nature prevalent in the region, he is heading for. â€Å"Follow me; I seek the everlasting ices of the north, where you feel the misery of cold and frost, to which I am impassive.† (Shelley 244). Nature is presented in its darkest aspects, as it brings hardships to human beings and terrorizes their mind. Nature made it more difficult for Victor to pursue the monster. The structure of the novel also adheres to the form of Gothic Romance. The story in the novel is presented through letters and journal entries, which was a common aspect in various Gothic romances.   Ã‚  Ã‚  The work Frankenstein is a Gothic romance which incorporates some elements of science fiction as well. The creation of a human being by Victor in the novel resembles the workings of a science fiction. Shelley is influenced by the political turmoil that prevailed during her time and her experience of this unrest is reflected in the character of Victor and plot of the novel. A scientific experiment causes a serious of horrific events in the novel. â€Å"Frankenstein's brilliance created a new organism-his abandonment, however, created a monster.† (Shackleford). The monster that is brought to life by a scientist evokes fear and lends Gothic effect to the novel. Victor, who creates the monster, is tormented by his own creation. â€Å"Frankenstein’s monster stands for technology that runs out of control out of control, that destroys its human creature.† (Potts & Murphie 99). Science fictions depict scientific

Wednesday, September 25, 2019

A Comparison between Two Possible Methods for Water Provision in South Essay

A Comparison between Two Possible Methods for Water Provision in South East, Queensland, Australia - Essay Example Colvin unveils that rainfall experienced in South-East Queensland has been significantly below average for the past six years, and this has marked the ten year history of severe water shortage in this part of Australia. The situation of water shortage in Australia has led to steaming debate in the political and public spectrum as blames are exchanged to politicians for failing to establish appropriate policies to ensure water security in the South-East Queensland. A portion of blame is also exchanged to the citizens who are perceived to misuse the water, and the potential drought seasons. Showing regard and concern about water shortage experienced in the South- East Queensland, this report is purposed to identify and propose two possible methods of supplying water in the arid areas of the South-East Queens land in Australia. The report will also analyze the cost effects of the two methods identified and propose the convenient method to be adopted first and the one to be adopted in th e process as the actual supply underway. The two methods that shall be addressed by this report will include water recycling and rainwater harvesting. Background The problem of water shortage in the South-East Queensland in Australia dates back about 100 years with the worst historical drought periods was lapsing between 1898 and 1903 (Colvin). However, 1974 offered slight compensation to the past periods of drought as the year experienced historic rains that led to yet historic floods that have never been experienced again in the region. According to Radcliffe (4), the statics of 2003 showing water provision depicted that about 414000ml was used in residential gardens, 183000ml used in laundry, kitchen used 61000ml, and bathroom consumed 317000ml. The 2003 statistics also indicate that the total volume of water consumed in residential was 1219000, industries and businesses consumed 437000ml, local government and its fire-fighters consumer total volume of 139000ml, system losses amo unted to 221000ml as errors in client meters amounted to 49000ml (Radcliffe 4). Importance of the Requirements Rainwater harvesting mainly involves collection of rain water that falls on the roofs and surfaces of structure and tapping that water into storage tanks for future use. Rainwater harvesting could also involve collection of the surface runoffs that forms on the ground and directing such water into storage dams and other water reservoirs for future use in irrigation or in households for cleaning items. When such scarce water is collected in the arid areas, it is usually considered as precious element and will be used with great care (Pigram, 2006, p. 145). Harvesting rainwater has been considered to be of lower cost since the process only requires one to have an iron roofed house of structure and water storage tanks, which are usually obtained at cheaper prices. Collection of rainwater is also environmental friendly since water collected reduces flooding, which might break s ewerage lines and result to unhealthy environment. Rainwater also has gained massive public recognition and acceptance as one of the best means of obtaining fresh water that is rich in natural mineral elements that are good for health. Water recycling simply means to reuse all ready used and contaminated water but after undergoing series of treatment and safety guaranteed for particular use. The sources of recyclable water include sewerages, municipal wastewaters and grey water among other sources of used waters. Recycling water is a friendly undertake to the environmental safety and sanity. Recycling water helps in reducing contaminations and loads of nutrients that may be hazardous to the

Tuesday, September 24, 2019

The case for contamination by Anthony Appiah Essay

The case for contamination by Anthony Appiah - Essay Example In such a society, it becomes difficult to control the trending social values that people share in such platforms. Appiah thus retains a passive viewpoint as he strives to maintain objectivity in the article. He discusses the importance of religion in the changing society as the discussion below portrays. Just as the title of the article depicts, Anthony Appiah discusses the â€Å"contamination† of the world. In his context, contamination of the world refers to the slow but sure infiltration of foreign cultures as people continually integrate on a global platform. The advancement of the society coupled with the development of new technologies have created a global village, such is a society in which people trade cultural values easily. According to Appiah, the seclusion of the traditional society sought to preserve the cultures and values of the societies that could not readily interact with others (Flood 21). With the intensified interactions in the contemporary society, it becomes difficult to monitor the actions of people as most societies continue to adopt the independent structures thus borrowing global cultural trends. As such, cultures continue to infiltrate the society; Appiah observes that such changes are contaminations of the inherent cultural values. While religion is a fundamental aspect of a society and a cultural feature, the changes in the current structures of societies continue to apportion a reserved function for religions. Unlike in some of the traditional societies in which the Church for example was an important organ of governance, contemporary societies have secular governments. This exhibits the inherent change in the structures of the societies and the cultural values of the people in contemporary societies. The modern structure of societies position religion as important in setting values and influencing the behavior of people in the

Monday, September 23, 2019

Are GM crops the state of the art of intensive agriculture or a step Essay

Are GM crops the state of the art of intensive agriculture or a step too far Discuss with reference to the conservation of nature - Essay Example ild species of plants such as corn or blueberries, then you will notice that their fruit is much smaller than that of varieties sold in the local grocery store (p.9). The reason for this difference in size he explains is that for centuries, farmers have sought to improve the size –and other characteristics- of the crops they grow. This allows them to produce a greater volume of food per acre of land, and it produced more food to feed people. GM foods have been around for much longer than most people know, in fact in the U.S, and 30% of Americans have been eating food made from GM crops since the year 1998 when the first Flar-Savr Tomato was introduced into the U.S supermarkets. Still, even with hundreds of millions of people around the world eating GM foods for more than a decade, controversy over the use of this technology remains very high all over the world (Diehl Paul 2014:1). This controversy is mostly fired up by the fact that GM foods were released into the market without the public knowledge. The Real Truth Magazine (2014), states that several reasons as to why the GM food issue has remained a huge topic for discussion and controversy around the world (p. 1-2). Biotech corporations market their products by selling the idea that they are ideal solutions to nutrition, world hunger and the environment yet all these foods have managed to do to attract speculations and fear about their possible side effects to the hu man race. To further explain this, The Real Truth Magazine lists these areas of controversy; Producers of GM crops claim that their genetically altered crops are more nutritious than natural crops. The promoters of ‘Golden Rice’ said that this rice was more superior to natural rich in vitamin A among other nutrients. After several tests, this rice was discovered to be inferior to natural rice. This lie was uncovered by Ticciati and Ticciati (1998), the authors of â€Å"Genetically Engineered Foods: Are They Safe? You Decide." They present

Sunday, September 22, 2019

General Description of the Community Essay Example for Free

General Description of the Community Essay Target area being assessed by the author is hospice service in Sioux Falls and surrounding areas provided by Avera Mckennan. Hospice care is end-of-life care provided by health professionals and volunteers Hospice care provides medical services, emotional support, and spiritual resources for people who are in the last stages of terminal illness. Although most hospice patients are cancer patients, hospice accepts anyone regardless of age and type of disease. The goal of hospice treatment is to keep patient comfortable and improve quality of life. Hospice care tries to manage symptoms so that patients last days may be spent with dignity, surrounded by his/her loved ones. Hospice care is family-centered: the patient and family are both included in the care plan and emotional, spiritual and practical support is provided depending on the patients wishes and families needs. Hospice is not so much a place, as it is a philosophy of care with a family-centered approach that considers the patient and family to be the unit of care (Lattanzi-Licht et al. , 1998). Avera Mckennan Hospice Services are the main focus of author. Avera McKennans Home Hospice and Palliative Care program office is located in the Dougherty Hospice House. Through this program, they provide hospice services in a variety environments: hospice care in the home setting, hospice care in an assisted living facility, hospice care in a skilled nursing facility and also, in Dougherty Hospice House. The Dougherty Hospice House is a unique sixteen bed hospice facility located on the Prince of Peace campus. This place provides a home like setting with specious rooms for patient and sleeping accommodations for family members. It also has a meditation room, wireless internet, beautiful meditative garden, large dining and family room for families to gather, and library. Dougherty Hospice House and its surrounding property are tobacco free environments. About 80% of all hospice care is provided in private homes, nursing homes, independent and assisted living facilities (Caffrey, C. et al. , 2011). If hospice care provided in patients home, a family member will look after their loved one much of the time. Someone form hospice team will usually visit patient once or twice a week assessing a patient and addressing current health issues. Avera McKennan Hospice team consist of 25 people including nurses, social workers, spiritual advisors/chaplains, nursing assistants, trained volunteers, pharmacist and medical director. In case of emergency home hospice patient can call the 24-hour hospice number for advice. A nurse usually can come to patients house at any time of the day or night or give an advise over the phone. Based on the patients circumstances and stage of care, a hospice interdisciplinary team (IDT) may provide variety of services. Registered nurses assist patient with management of discomfort, pain and side effects of previous treatment ( nausea from chemotherapy). Also nurses help educate both patient and family about what is happening. The nurse is a link connecting patient, family and physician. Home health aids provide extra support for personal care such as bathing, shaving, dressing and eating. Trained hospice volunteers offer assistance with everyday tasks such as shopping, babysitting, and carpooling. They are being available to listen to the patients and families and offer compassionate support. Primary doctor approves plan of care for hospice patient and works with hospice team. A hospice medical director who has expertise in symptom management and end-of-life care is available to the attending physician, patient and family, and hospice team as a great resource and consultant. Chaplains, priests, or other spiritual counselors help patient and family explore the meaning of the death, and perform religious ceremony specific to the patient. Respite care can be provided by inpatient hospice to give family a break from stress of care giving in up to 5-day periods. This service recognizes the need for caregivers to have time away from caretaking roles (Ingleton, Payne, Nolan, Carey, 2003;Lattanzi-Licht e. l. , 1998). Terms such as caregiver burden (Chwalisz Kisler, 1995), caretaker role fatigue, spousal burnout, and role engulfment refer to an imbalance between the physical and mental resources needed to give care and those available within the family unit (Reese Sontag, 2001). Regularly scheduled family conferences most often led by the hospice nurse or social worker allow patient and family members share feelings, talk about what to expect, what is needed, and learn about process of dying. The interdisciplinary team coordinates Avera McKennan Hospice services and supervises al care 7 days a week, 24 hours a day. The team is making sure that current information is shared among all the services involved in patients care. Official Community Government (form of government). For-profit and nonprofit hospices have the same regulations. They must comply with State low and Code of Federal Regulations governing hospice care. For-profit hospices grow more than six times faster than nonprofit hospices. Profit sometimes risks compromising the quality of care patients receive. Nonprofit hospices provide hospice services to anyone including persons who do not have health insurance coverage and cannot afford to pay for care. In this case, nonprofit hospice can provide services to person free of charge as part of its charitable mission because nonprofit status of the hospice requires it to offer charitable services and they are dedicated to the mission of caring those in need. Main purpose of for-profit hospices is to make money and pay dividends to their stockholders. They have no obligation to provide services to anyone who does not have Medicare, Medicaid or private insurance coverage. However, both type of hospices are trying to make money, but when they compete for patients, they must provide better care. Averas Home hospice services are covered 100% under Medicare and some Medicaid plans, but inpatient care at the Dougherty Hospice House involve some financial expense. Social workers offer patients and their families help with payment options and never turn away a patient for inability to pay for the service. Medicare is the primary payer for hospice services covering 77% of all hospice expenses. The rest is paid for by Medicaid (4%), private insurance (12%) or other sources (7%). Compare to hospital and skilled nursing facilities, hospice is considered a cost-effective service. Hospice charges per day are much lower than hospitals and skilled nursing facilities. Hospice care is covered in full by most insurance. Medicare and Medicaid provide a special Hospice Benefit. This benefit provides 100% coverage for visit by staff, medications related to the hospice illness, durable medical equipment in the home, and supplies for skin care, incontinence management, dressings, etc. Hospice care covered under Medicare includes both inpatient care when needed, and home care services. The focus of hospice is on care, emphasizing help the person to make the most of each day by providing comfort and pain relief. Most private insurance companies include hospice care as a benefit. Patient and family can hire hospice providers and pay for their services out of pocket. If patient has a limited financial resources, non-profit hospices provide services without charge as part of charitable mission. Any patient who enters hospice must be evaluated at the time of admission to the hospice program. Hospice dietitians assist the patient in reaching the best nutritional goals, depending on the current state of the patient’s condition. Common problems for hospice patients are nausea and vomiting. These can be controlled with anti-emetics in some cases, while for some patient s change of diet is sufficient. Educating patient and family about the changes occurring in the patient’s body is imperative. During the course of illness, patient experience changes to some extend in their food intake. It is common for the hospital patient to reduce oral intake of food and fluids as the disease progresses. In general, there is metabolism alterations occur in patient’s body with a terminal illness. Furthermore, there comes a time when the body begins to break cells down instead of building them up. At this point, the body is no longer takes nutrients in. Sometimes patients are forced to take food by family members; in this case the body may refuse through vomiting or diarrhea. A hospice dietitian will explain when this point is reached. However, addressing to stop oral intake before this point is reached is not appropriate. Ongoing assessment of hospice patient nutritional needs will help to determine if there is any appetite change or ability to take the food in and keep it. Based on a study of the non-hospice end-of-life experience of 3,357 seriously ill patients who died reported 40% were in severe pain prior to their death, and 25% experienced moderate to great anxiety of depression before they died (Lynn, 1997). However, hospice is a compassionate way to deliver health care and supportive services. Despite the low South Dakota’s death rate compare the national death rate, the two leading causes of death are heart disease and cancer, accounted for half of South Dakota deaths. Healthy lifestyle changes are critical in reducing deaths due to cancer and heart disease. These modifications can be accomplished by reducing tobacco use, increasing physical activity, and developing healthy eating habits. Minorities in South Dakota include African American, Asian, and Hispanic populations. In general, language barriers, transportation, finances, and lack of insurance were found to be the issues encountered by minorities in seeking adequate health care. Furthermore, end of life care is not reach minority population and remains as a national issue. The majority of hospice patient care is provided in the place patient calls â€Å"home†. In addition to private residences, this includes nursing homes and assisted living facilities. As the health care becomes better, the population lives longer. Nursing home patients benefit from hospice services as much as people living in their homes. According to studies, nursing home residents enrolled in hospice were less likely to be hospitalized in the final 30 days of their life (24% vs. 44%) (Miller, 2001). They were more likely to be assessed for pain, were twice as likely to receive pain management within clinical guidelines (Miller, 2004). Large percentage of elderly people receives home hospice service. Many homes need some modifications for the hospice services to be provided. For example, a bedroom may need to be relocated to a main level of the house for those who have difficulties claiming stairs. There is widening of the hallways may be required to accommodate a wheelchair access. Because of the growing number of people who wish to stay and receive care at home, general contractors are available to assess remodeling needs. A number of programs and sources provide reduced rates, loans, or free services with home modifications.

Saturday, September 21, 2019

Snow White and the Huntsman Essay Example for Free

Snow White and the Huntsman Essay Snow white and the huntsman is the battle between beauty and innocence for fairest blood. This is a four star dark twist to the traditional fairy tale of the orphaned princess, Snow White (Kristen Stewart), and her escape from her step mother and evil Queen Ravenna (Charlize Theron). From the producers of Alice and the Wonderland, An Evil Queen, Ravenna, tricks, seduces, and kills the king; she takes the kingdom and rules with intimidation and magic. She draws her life force and youth from magic which is fuelled by the draining of other beautiful young hearts and souls. Her life is to be the fairest in all of the land yet another has come of age to surpass even the strongest magic. â€Å"She is life itself† Snow White, the late king’s daughter, was kept alive for many years in a tower in the castle since she was a little girl. Now she is what stands between Ravenna and immortality. â€Å"Be warned, her innocence and purity is all that can destroy you but she is also your salvation†. In a flurry of lust and luck, as well as her connection with Mother Nature, she escapes into the dark forest. The adventure begins as the Queen hires the Huntsman who knows the dangerous dark forest, to bring the princess back to her. The pursuit of Snow White, on an evil Queen’s quest for immortality – the princesses snow white heart. The pursuit of the princesses’ heart starts†¦ and ends with the flawless acting of Oscar winner Charlize Theron. The South African born Theron, known for her blonde hair and revengeful roles in Monster (Alieen Wuornos), and The Italian Job (Stella Bridger), graces the screen in a five star performance. She shows her versatility as a lead actress in her not revengeful but narcissistic character of Ravenna. This is portrayed in the second Mirror scene. Ravenna asks the Mirror â€Å"Mirror Mirror on the wall, who is fairest of them all?† The mirror tells her† My queen, you have defied nature and robbed it of its fairest root. But on this day there is one more beautiful than you.† She becomes angry as she longs to be the most beautiful in all the land. Ravenna’s last words to the king before she murdered him were â€Å"Men use women. They ruin us and when they are finished with us they toss us to the dogs like scraps†. Her conviction as an actress is authentic but what triumphs over that are her powerful actions that can convey an entire conversation in a simple movement. This is best seen where she is dragging herself out of the black goop after killing Snow White. She uses one hand and reaches, in vain, out to the Mirror as if to beg it to tell her she is most beautiful now the princess is dead. Even during her own near death moment her narcissistic personality shows though a very basic need for power and prestige. Allot of power and prestige of Ravenna comes to this movie through the main soundtrack ‘Breath of life’ by Florence and the Machine. After a drum beat beginning that sets the medieval mood, a choir and rhythmic beats adds a flare to the unique voice of Florence. Jon Dolan of the Rolling Stone reviews comments that it was â€Å"All doom-drum rush and endless-midnight orchestral sweep† Ravenna looking for her breath of life (I was looking for a breath of life, A little touch of heavenly light), but the world that had once turned on itself now turned on her and cried no (But all the choirs in my head sang, No oh oh). You can hear in the beat that she is fighting life itself. The casting of this movie was a mix of brilliance and flawed choices. Where Theron’s casting was no doubt the brilliance, Kristen Stewart as Snow White was the major flaw. Stuart, known to her fans as new girl Bella, from the Twilight saga, showed her incapability of holding a lead actress role. Unlike the role she played in twilight, she has no other main characters to hold her up. She drains the personality from Snow White in addition to the lack of importance felt in her character. This is predominantly seen in the â€Å"fight to the death† scene with Snow White and Ravenna. While Theron oozes fire and elegance, Stuart can’t seem to capture a believable character. Snow White is supposed to be innocence and humility in contrast to the Queens magic and pride. Her sharp angled face, greasy voice, and empty facial expressions she was a flawed choice by the directors. Drunk, bitter and half dead. The gorgeous Chris Hemsworth plays the in between of life and death as the Huntsman. Once being a small point in the original brothers Grimm fairy tale, Hemsworth’s huntsman has created a new take on the contrast between the two main roles. This is greatly shown when he is pulled out of a dirty tub of water with a hangover and a debt and he is brought to the queen’s throne. When the queen’s guards draw spears against him he says â€Å"Do me the favour, I beg of you.† He can’t stand to be alive because the Queens magic killed his wife for her youth. Finn tells the Huntsman â€Å"She screamed your name but you werent there. Now you can beg her forgiveness in the other world.† Now as Snow White lay dead the Huntsman begs for forgiveness from her â€Å"Im so sorry I failed you. Im so sorry. But youll be a queen in Heaven now and sit among the angels.† It’s his kiss and sorrow which awakens her from death itself. Colleen Atwood is a name that is very familiar in the movie designer world and with a BAFTA and OSCAR nomination is certainly one of the very important people in the makings of this movie. Some of the best designing seen this decade has come from Atwood who is known for her dark works in Dark Shadows (2012), Alice in the Wonderland (2010), Edward Scissorhands (1990) and The Silence of the Lambs (1991). Her epic fantasy costumes bring the film to a whole new gene of evil allure. From the Huntsman ancient clothes to the modern flare of Snow Whites traditional dress, Atwood’s best work has to be Ravenna’s wardrobe. A beautiful wedding dress fit for a Queen to an evil black cape fit for a Witch empress, the skilful dress of this movie would be the floor length silver dress. Worn in the scene in which she is stabbed with a dagger, this piece of art is exquisite, with the flared sleeves, fitted body, and square neck brings the vintage era setting to life. This dress would not be complete without being coupled with a fabulous collection of accessories including a black and silver choker with matching earrings, a purple pendant encrusted with silver on a beaded chain and a crown that mimics the one on the statue of liberty. The most powerful accessory would have to be the claws on her right hand. This simple yet vicious prop is used in small roles throughout the movie but the best example is when she uses her index claw to eat a raven heart. This will in no doubt send a delicate shiver of disgust down your spine. This dark, evil and beautiful movie is worth all its four stars. Even though Kristen Stewart’s performances as Snow White was not nearly up to par, if looked upon as the story of Ravenna’s demise, Theron more than makes up for what Stuart lacks. A story of Beauty, lust, pride and a quest for fairest blood, this is the must see the movie of 2012. â€Å"Lips red as blood, Hair dark as night, bring me your heart, my dear, dear Snow White.†

Friday, September 20, 2019

The First Born

The First Born The title of this poem is The First Born. The poem is set in Australia today. The speaker in the poem, is the Land, which is distressed and franticly searching for her first born, the indigenous Australians who are in a bad condition. The Land continues searching for her first born and asks you whom I bore after which is the white people what had become of the indigenous Australians. The white people were silent and did not reply. An important idea in this poem is the relationship between the indigenous Australians and the white people. The poet seems to express to readers that the indigenous Australian are in a bad condition. Another idea is that all human beings regardless of race are equal and part of the same human family. In terms of emotion, the poet invokes feelings of hurt and anxiety through the Land. The poem suggests that the indigenous Australians are in a bad condition through the use of various literary techniques. The Land is heard calling out for her first born the indigenous Australians, and the poet describes that the light of their being barely aglow? which is a metaphor that suggests the vitality of the indigenous Australians are diminished and there is little hope in their future. Therefore we get the idea that the indigenous Australians are backwards in terms of political economy, social and education wise. The Land is also strain my ears for the sound of their laughter which is another metaphor which seems to the readers that the indigenous Australians have little joy and happiness in their life. We get an image of the backwardness of the indigenous Australians that they deprived and therefore unhappy. Through the line Where are the laws and the legends I gave?, the poet suggest that the culture that the indigenous Australians culture history are diminished and forgo tten. The readers get an image that the indigenous Australians has been neglected and their culture wiped out , therefore the indigenous Australians have no identity or culture to call their own. To sum up, it is suggested that the indigenous Australians are in a bad condition which includes the lost of their culture which has been past down for generations. The poem also presents to us the idea that all human are equals and therefore part of the human family, thus there should not be any discrimination against any race, which includes the indigenous Australians. The poet express this to readers through the line They were formed out of my dust is a metaphor which renames the people are being born, which is a reference the Bible. According to the Bible, people are formed out of dust and thus it means that all people are formed from the same substance, and dust being part of the earth or God , thus all humans are equal in Gods eye and thus have to be treated with respect. Another evidence of the idea of equality is in the line you whom I born after which suggest that the Land willing to forgive the white Australians for the past misdeed as, in the poem the Land acknowledges the white Australians one of her children. To conclude, the poem indicates the idea all humans are equal and the Land accepts both the indigenous Australians and white people. The Land in the poem expresses various feelings and emotion throughout the poem. The Land is personified as a mother and the various people her children. The Land is anxious that her first born cannot be found and her feelings are intensified. This makes the situation more dramatic as the anxiety of a mother who has lost a child is without comparison. The Land would feel that way as the indigenous Australians do not have much vitality and playing very little part in society due to their backwardness ,thus the indigenous people are missing in society. The Land is hurt due to the fact her first born is dying and neglected. The Land as a mother will not want to see her children dying and neglected. We thus feel the anxiety and hurt felt by the Land. In conclusion, the poet seems to confront us the dire situation faced by the indigenous Australians. The poet might be suggesting that we should treat humans equally and fairly as we are all part of this global family. In conclusion, the indigenous Australians should forgive and not forget. The poet might be suggesting that we should treat humans equally fair as we are part of this global family. This will ensure a better future for the next generation as hatred in the indigenous Australians towards each other will not be passed down

Thursday, September 19, 2019

Methods of Fusion :: Nuclear

Methods of Fusion Abstract Nuclear fusion was discussed in this paper. First, the reader is given an introduction to nuclear power and is then led to fission/fusion. Fusion is discussed as being better than fission and reasons are given as to why that is so. Fusion methods are then discussed and current and planned machines are placed for discussion. Lastly, the machines are summarized. Introduction Today, you hear news about nuclear power. But what is nuclear power? Well, in an atom, there is a force known as the strong nuclear force, which exists in atoms. The first way is fission, which breaks the atom apart using some method. This is the method that is currently providing 20% of the power in the power grid. The other less developed method is still in the testing stage but the basic concept is fusion. Hydrogen isotopes (atoms with different numbers of neutrons) are combined together using several different methods which will be discussed later. This results in bonds, which generate energy (Jensen 2006). Discussion Now you know how fission is being utilized throughout the world, and you have a basic idea of how nuclear power works. However, there is a problem with nuclear fission being that there are many dangers. For one, nuclear fission creates nuclear waste, which cannot be destroyed and must be stored somewhere. Also, this waste is radioactive which makes the life surrounding the waste exposed to radiation and as a result, the waste destroys the nearby ecosystem. Also, if there happens to be a meltdown, radiation could spread for miles depending on the wind and kill many people. Take Chernobyl for example. There was a nuclear reactor there that meltdown. As a result, the area in a 20- Methods of Fusion mile radius around the plant had to be evacuated because the radiation levels were so high. The fuel is uncommon and takes time to purify in some cases. The solution to this problem is to use nuclear fusion. Through this, humankind has a much better way to create energy on the scale of MW. Not to mention, the fuel needed for nuclear fusion is only deuterium and tritium, which is an isotope of hydrogen, the most common element on Earth. Also, the energy output is very high. For example, JET, the Joint European Tokomak can produce 16 MW in one pulse. That’s 16 million watts. Also, the waste product of the fusion reactor is not radioactive but is instead helium.

Wednesday, September 18, 2019

First Amendment And Music Censorship Essay -- Censorship

The First Amendment to the Bill of Rights exists because the Founders of our country understood the importance of free expression. The First Amendment states "Congress shall make no law . . . abridging the freedom of speech, or of the press . . ." (Commission on the Bicentennial of the United States Constitution 17). One of the ways the American people use this freedom of speech and expression is through the creation of the art form known as music. Music's verbal expression bonds our society through our emotions and experiences. This fundamental right of freedom of expression is being threatened by public and governmental groups who believe they have authority to monitor and decide what others should experience. The censorship of music lyrics is a violation of our First Amendment right, and public groups should not be allowed to bypass this right to censor obscene lyrics produced in the music industry. Through the decades, artists such as Elvis Presley, The Beatles, and The Rolling Stones have raised controversy over their seemingly explicit acts that are now viewed as legendary. Parents banned their children from watching Elvis Presley and his outrageous hip movements though today these moves are copied by Britney Spears, pop groups, and dancers all over the world. In 1956, Ed Sullivan deemed Elvis "unfit for a family audience." However, in 1970 Elvis met the President in the Oval Office, and now his face appears on a postage stamp (RIAA; History 2 of 4). On June 15, 1966, The Beatles released their album Yesterday...and Today featuring a shocking cover with the foursome surrounded by raw meat and butchered baby dolls. Immediately the album was withdrawn from music shelves everywhere and returned only with a new approved c... ... something we have not yet discovered. We have seen the objections of yesterday as the legends of today. Now we must stand strong to make our own decisions and see things through our own eyes and touch it with our two hands, because it is through experience and challenge that we all grow and discover new ideas. Works Cited: Commission on the Bicentennial of the United States Constitution. 1791 - 1991 The Bill Of Rights and Beyond. Commission on the Bicentennial of the Unites States Constitution, 1990. Duin, Julia. "Warning Labels Don't Keep Kids From Shock CDs." Insight 12 Jan. 1998: 1-2. Hald, Karen. "Music - A Human Right." . Recording Industry Association of America . "Freedom of Speech." Brief History . Recording Industry Association of America. "Parent's Page." Background . Walters, Shari. "About Music for Teens." Parental Advisory Labels . First Amendment And Music Censorship Essay -- Censorship The First Amendment to the Bill of Rights exists because the Founders of our country understood the importance of free expression. The First Amendment states "Congress shall make no law . . . abridging the freedom of speech, or of the press . . ." (Commission on the Bicentennial of the United States Constitution 17). One of the ways the American people use this freedom of speech and expression is through the creation of the art form known as music. Music's verbal expression bonds our society through our emotions and experiences. This fundamental right of freedom of expression is being threatened by public and governmental groups who believe they have authority to monitor and decide what others should experience. The censorship of music lyrics is a violation of our First Amendment right, and public groups should not be allowed to bypass this right to censor obscene lyrics produced in the music industry. Through the decades, artists such as Elvis Presley, The Beatles, and The Rolling Stones have raised controversy over their seemingly explicit acts that are now viewed as legendary. Parents banned their children from watching Elvis Presley and his outrageous hip movements though today these moves are copied by Britney Spears, pop groups, and dancers all over the world. In 1956, Ed Sullivan deemed Elvis "unfit for a family audience." However, in 1970 Elvis met the President in the Oval Office, and now his face appears on a postage stamp (RIAA; History 2 of 4). On June 15, 1966, The Beatles released their album Yesterday...and Today featuring a shocking cover with the foursome surrounded by raw meat and butchered baby dolls. Immediately the album was withdrawn from music shelves everywhere and returned only with a new approved c... ... something we have not yet discovered. We have seen the objections of yesterday as the legends of today. Now we must stand strong to make our own decisions and see things through our own eyes and touch it with our two hands, because it is through experience and challenge that we all grow and discover new ideas. Works Cited: Commission on the Bicentennial of the United States Constitution. 1791 - 1991 The Bill Of Rights and Beyond. Commission on the Bicentennial of the Unites States Constitution, 1990. Duin, Julia. "Warning Labels Don't Keep Kids From Shock CDs." Insight 12 Jan. 1998: 1-2. Hald, Karen. "Music - A Human Right." . Recording Industry Association of America . "Freedom of Speech." Brief History . Recording Industry Association of America. "Parent's Page." Background . Walters, Shari. "About Music for Teens." Parental Advisory Labels .

Tuesday, September 17, 2019

Contrasting Imagery with Symbolism Essay

The story The Cathedral by Raymond Carver is a story of transformation of a human character’s life from depression and carelessness to belief and diversity. A cathedral is a symbol of faith, conversion, creativity and strength and is therefore a substantial component of Carver’s story. The process of drawing it becomes the climax of the story when the author uses intense imagery to describe the workings of the drawing that the husband is creating. Imagery and symbolism are greatly used in this story, but in very different ways to provide very different effects. Moreover, the cathedral is connected to the representation of the blind man as a preacher and a teacher. The symbolism of the cathedral in the story makes one believe in the future and optimism. A cathedral symbolizes religion, and the TV show that the two men watch leads to an important question. The blind man asks the husband to describe to him the image of a cathedral. The husband is unable to successfully compose an accurate description because he doesn’t understand the meaning and the symbolism of the building. He is not a man of religion, and he is watching the show only because he has nothing else to do. â€Å"Don’t ask me why this is,†(245) he says. Compelled to think about the purpose of cathedrals, the narrator begins to realize that they symbolize the struggle that people endeavored to build those structures. What would make people do such a thing? Belief and religion sometimes give direction and meaning to peoples’ lives. The effort required to build a cathedral becomes an outburst of creativity. The inability of the husband to understand the purpose of cathedrals shows that he lacks creativity, and his life is meaningless and not fulf illing. By making the husband draw a cathedral together with him, the blind man teaches him about the importance of the cathedrals and the significance of believing in something. The husband experiences something that he has never thought would happen to him, and it makes him aware of the diversity of life. Before Robert came, the husband was alone, and his wife says that he didn’t have other friends. â€Å"Never thought anything like this could happen in  your lifetime, did you, bub?† asks Robert and there is no answer. The narrator’s loneliness caused by urban life has become his style of living, and when he has to communicate with others and to share ideas he becomes anxious. The detachment makes him pessimistic and closed-minded. The narrator’s anxiety disappears as the story progresses, and when he begins to draw he is more relaxed and in a creative mood. The first thing that he thinks of is his house: â€Å"I drew a box that looked like my house†(247). The transformation of the house into a cathedral is a very powerful image. His home and himself derive the symbolism of a cathedral. And â€Å"What’s a cathedral without people?†(247). Characterized as a social place where people meet, the cathedral becomes symbol of the husband’s ability to overcome his loneliness and his inability to communicate. The author uses suddenly uses intense imagery in the story that he hasn’t used before, this is to emphasize the importance of the moment. â€Å"His fingers rode my fingers as my hand flowed over the paper. It was like nothing that I have ever felt before.†(247) This marks the climax of the story as well as the turning point in the thoughts and beliefs of the husband. Nevertheless, the husband doesn’t change his life by himself. It seems that the blind man is showing the husband how to draw and not the opposite. Robert is in control, but the narrator does not oppose that experience. He has been waiting for something like this to happen, and he is happy that it happened. The process of drawing a cathedral together with the blind man creates the symbolism of a cathedral and becomes a religious experience, which symbolizes the husbands conversion – his spiritual epiphany from good to bad. He is taught the meaning of value and virtue; he is happy that he encoun tered Robert. The symbolism of the cathedral is also directly connected to the blind man. His question if the husband is a religious person is almost rhetorical because he already knows that he isn’t. The blind man is a very powerful person because his blindness has made his other senses different than ours in a wonderful way. He sees things from a special perspective, and becomes a person who can share a different angle toward wisdom, a different entrance  toward knowledge. For the husband, Robert comes as nobody, and he becomes somebody. He is like a preacher who opens your mind and gives a meaning to life. The blind man is a teacher, and his image is connected to the spiritual image of a cathedral. The image of a cathedral is an image of something enormously strong, stable and at the same time beautiful and creatively artistic. The author uses imagery not only to create a mental portrait of the physical surroundings of the story, but also to breath life into the symbolism of the images that are created. The small amount of imagery that is used is very significant in that the imagery that is used, brings across very strong and clear pictures of meaning and thought. The symbolism that is in this story is enormous. It can be found everywhere. It is used in contrast with imagery to give greater meaning to the story that otherwise wouldn’t have been clear.

Monday, September 16, 2019

Fahrenheit 451 and Brave New World Essay

Fahrenheit 451, by Ray Bradbury is a futuristic view of a society and its people’s roles. This prophetic novel, first written and published in the early 1950s, is set in a future where books, and the ideas they represent and manifest, are burned to prevent disruptions in society. Furthermore, TV is everyone’s drug of choice, and independent thinking is basically illegal. Its central character, Guy Montag, is a fireman responsible to that society for ensuring those burnings takes place, but an unexpected chain of events leads him to question both himself and the society in which he lives. Bradbury employs the extravagance of life today. In addition to the advancement in technology and numerous occupations, in order to show how life would become if the future drastically turns for the worse. In future world of Bradbury there are ironic reversals of roles for people and things that one would have once taken comfort in, such as the role of the fireman, or the nature of a do g. Aldous Huxley also uses a similar concept, a society that is out of control, in his book Brave New World, which deals with a man living in a changed society. Brave New World by Aldous Huxley Published in 1932, is a futuristic society in which the individual is sacrificed for the state, science is used to control and subjugate, and all forms of art and history are outlawed. In short, the book fits into the classic mold of â€Å"dystopian† literature. Huxley expects his readers to consider the role of science and literature of the future world. Unlike Fahrenheit 451, Brave New World includes a group of people unaffected by the alterations in society, a group that holds religious beliefs and marriage, to compare and contrast today’s lifestyle to the proposed lifestyle of the future. One theme that both Brave New World and Fahrenheit 451 share is of individual discovery by rejecting a passive approach to life and dystopian society. In Brave New World the main characters the â€Å"Savage† John and Bernard Marx eventually realize the errors within their own culture. Guy Montag, the protagonist in Fahrenheit 451, starts to realize that society could be better, but due to some events that are out of controlled by advanced technologies, little value placed on the importance of relationships between people and the ban of reading books. Montag is forced out on his own, missing from society, to live his life with others like h imself who have similar beliefs toward  society. Marx, from a civilized culture, questions why his society lacks history. He wonders why his society lacks books and why they were banned just because they are old and supposedly is not an encouragement to the new culture. By visited a reservation, a home of an â€Å"uncivilized† culture for savages, Marx is able to view first-hand information of how life and society use to be. Later he tries to combine some of what he saw into his work as an advertising agent. From this contrast with the other culture, Marx realizes more about himself as well. His view of things that confused him became more understanding. In â€Å"Brave New World† the citizens who are lucky enough to be in a higher class enjoy a variety of pleasures from a drug called Soma to sex with multiple partners. What is unique about the society in â€Å"Brave New World† is that the conflict cannot be discerned unless one digs deeper into the inner workings of the society. When that is accomplished one realizes that the society is built on the extreme views, such as abolishment of religion, that are only theoretical in our time but are practical in the novel. One of the most notable aspects of the novel is its use of scien tific concepts. The society in the novel has become so reliant on science and technology that they have replaced the biological process of child birth with a more mechanized assembly line type of system. John, often referred to as â€Å"the Savage† because he was able to leave the reservation with Marx to go to London, also has a hard time adjusting to the drastic changes. The son of two members of the modern society was born and raised on the reservation but, he learned from his mother the values and the customs of the â€Å"civilized† world while living in a unique culture. These concepts, human reaction to changes in their culture and questioning of these changes, are plain throughout the book. Huxley’s characters either conform to society’s demands for uniformity or rebel or begin a process of discovery; there are no people in the middle. Huxley makes his own views of man and society evident. He shows that those who conform to the â€Å"new world† become less human, but those who actively question the new values of society realize the truth about society and people in general. An example of this is Huxley’s views of drugs as an escape. The conforming members of society used widely a drug called soma, which induces hallucinations and escapes from the conscious world for two to eight hour periods. Those very few who did not, John included, did not because they thought the drug either unclean or an  easy escape, one not needed in a society aiming at making life very simple. By refusing to follow in this escape from reality, John is ultimately able to break from society and define his own destiny. Alike Brave New World, Fahrenheit 451 shares a similar theme of a character lost in his society. As Montag live his life he begins to realize things that he didn’t know existed and later is able to see through the government and the official policies of his society. He does so by gradually beginning to question aspect of society, which most people simply accept as fact. Montag’s job as a fireman serves as a setting to show how people passively accept the absurdity of their society. Instead of rushing to put out fires, as firemen do today, Montag rushes to start fires, burning the books and homes of people reported to have books. This was considered by most people to be a respectable profession. But on different occasions Montag took a book out of burning homes and want from time to time to read them. From this, he begins to question the values of his society. Fahrenheit 451 also relates to Brave New World with the concept when characters escape from reality through the use of soma, Montag’s wife, and many other characters, escape through watching a sophisticated form of television. This television system covers three of the walls of the Montag’s TV has a control unit that allows the watchers to interact with the characters on the program. Another unit inserts Mrs. Montag’s name into specific places, thus creating the image they the characters are actually conversing with her. Montag’s wife, having only a few friends that she rarely sees, spends much of her day in this room, watching a program called â€Å"The Family.† This program was a government sponsored program that showed the viewers what life at home should be like. Furthermore in Fahrenheit 451, the problem that Montag’s wife takes the program as a substitute for reality. She is al most addicted to the program, much as people were with soma in Brave New World. Bradbury uses this television and its programs as a way of showing the escape he is worried people will look for in the future. Without actively questioning society’s values, he is concerned that people will look for ways to idly spend their time. But like Marx, Montag chooses not to take part in this addiction. By refraining, he can see the affects it’s use has on the people around him, much as Marx and more importantly John the Savage saw in their culture. While sharing many similarities thus the have many differences. For  instance, Montag’s society is used to constantly being at war. Even though the wars last only a day or less, they serve as an element of control for the ruling group and as another technological display. In contrast, Brave New World’s society features â€Å"peace.† The inhabitants have been conditioned to think that mindless pleasure seeking and stability are key to happiness. They view the controllers as taking care of them and preventing â€Å"unpleasantness† such as war. In true Bradbury fashion, Fahrenheit 451 warns more against the dangers of an overdependence on technology than it does against overreaching governments. Brave New World does feature technology bein g used to control, but Huxley seems to be more concerned with illuminating how ruling parties obtain and keep power through a variety of methods. While the endings of both novels mirror the conclusions of other dystopian works, they are quite different from one another. Fahrenheit 451 concludes with reserved optimism. Montag has managed to escape Captain Beatty and the hound and even the destruction of the city and begins his life with the likeminded â€Å"Book People.† In Brave New World, John cannot live within the confines of his society and commits suicide. Both authors try to show that with life made easier by strong government control and a lack of personal involvement people will no longer spend their time thinking, questioning or developing their own ideas. Through these various diversions from normal behavior in society, Marx, John the Savage and Guy Montag are able to see the truths behind the societies they live in and are able to learn about themselves. And though their discoveries meant that their lives would be changed forever, the authors succeeded in showing that the key to humanity lies in thinking and questioning. These men found themselves through their own discoveries, much as Bradbury and Huxley hope others will do.

Sunday, September 15, 2019

My Classmates

Patricia’s classmate is a young man about in his late teens early twenties. He is quite tall, slender build about six feet one inch maybe a little shorter. He looks as if he weighs about one hundred and seventy pounds maybe a little more or a little less. He has chestnut brown hair and it is very short, his hair is cut with a fade so it gets shorter towards the bottom he has side burns but they are very short to about the top of his ear. This classmate is a very good looking guy, he has a square shape face. He doesn’t have a lot of freckles but a few. He is Caucasian his skin tone is a natural beige color.His eyes are a pretty hazel, pale green on the outside and towards the middle a light brown, he also has pretty long eye lashes. His facial hair looks as if he has a five o’clock shadow all the time. He has nice teeth, not bleach paper white but they have a little tint of yellow to them kind of like you can tell he drinks coffee, his teeth also are straight exce pt the top center teeth are a little crooked and slant towards the inside of his mouth. This classmate doesn’t seem like a shy person, he seems to be outgoing and likes to have people around he likes to be sarcastic towards others too.His voice is not very high or loud, he has a low soft timber. Which is soothing to others when it’s been a hectic day. The classmate doesn’t have a distinctive type of clothing he dresses casual and seems to be comfortable in anything he throws on. He tends to wear Vans shoes all the time. He doesn’t seem to have a certain brand of anything he wears besides his shoes so probably just any jeans he feels comfortable in. So in all this classmate is an everyday kind of guy, he is casual, good looking, nice trimmed hair, with a five o’clock shadow all the time, and seems like a really nice guy to keep around as a friend.

Saturday, September 14, 2019

Central Processing Unit and Memory Location

MICROPROCESSOR 8085 †¢ Reference Book: – Ramesh S. Goankar, â€Å"Microprocessor Architecture, Programming and Applications with 8085†, 5th Edition, Prentice Hall †¢ Week 1 – Basic Concept and Ideas about Microprocessor. †¢ Week 2 – Architecture of 8085 †¢ Week 3 – Addressing Modes and Instruction set of 8085 †¢ Week 4 – Interrupts of 8085 †¢ Week 5 onwards – Peripherals. Basic Concepts of Microprocessors †¢ Differences between: – Microcomputer – a computer with a microprocessor as its CPU. Includes memory, I/O etc. Microprocessor – silicon chip which includes ALU, register circuits & control circuits – Microcontroller – silicon chip which includes microprocessor, memory & I/O in a single package. What is a Microprocessor? †¢ The word comes from the combination micro and processor. – Processor means a device that processes whatever. In this context proces sor means a device that processes numbers, specifically binary numbers, 0’s and 1’s. †¢ To process means to manipulate. It is a general term that describes all manipulation. Again in this content, it means to perform certain operations on the numbers that depend on the microprocessor’s design.What about micro? †¢ Micro is a new addition. – In the late 1960’s, processors were built using discrete elements. †¢ These devices performed the required operation, but were too large and too slow. – In the early 1970’s the microchip was invented. All of the components that made up the processor were now placed on a single piece of silicon. The size became several thousand times smaller and the speed became several hundred times faster. The â€Å"Micro†Processor was born. Was there ever a â€Å"mini†processor? †¢ No. – It went directly from discrete elements to a single chip. However, omparing todayâ€⠄¢s microprocessors to the ones built in the early 1970’s you find an extreme increase in the amount of integration. †¢ So, What is a microprocessor? Definition of the Microprocessor The microprocessor is a programmable device that takes in numbers, performs on them arithmetic or logical operations according to the program stored in memory and then produces other numbers as a result. Definition (Contd. ) †¢ Lets expand each of the underlined words: – Programmable device: The microprocessor can perform different sets of operations on the data it receives depending on the sequence of instructions supplied in the given program.By changing the program, the microprocessor manipulates the data in different ways. – Instructions: Each microprocessor is designed to execute a specific group of operations. This group of operations is called an instruction set. This instruction set defines what the microprocessor can and cannot do. Definition (Contd. ) – Ta kes in: The data that the microprocessor manipulates must come from somewhere. †¢ It comes from what is called â€Å"input devices†. †¢ These are devices that bring data into the system from the outside world. †¢ These represent devices such as a keyboard, a mouse, switches, and the like.Definition (Contd. ) – Numbers: The microprocessor has a very narrow view on life. It only understands binary numbers. A binary digit is called a bit (which comes from binary digit). The microprocessor recognizes and processes a group of bits together. This group of bits is called a â€Å"word†. The number of bits in a Microprocessor’s word, is a measure of its â€Å"abilities†. Definition (Contd. ) – Words, Bytes, etc. †¢ The earliest microprocessor (the Intel 8088 and Motorola’s 6800) recognized 8-bit words. – They processed information 8-bits at a time. That’s why they are called â€Å"8-bit processors†.They can handle large numbers, but in order to process these numbers, they broke them into 8-bit pieces and processed each group of 8-bits separately. †¢ Later microprocessors (8086 and 68000) were designed with 16-bit words. – A group of 8-bits were referred to as a â€Å"half-word† or â€Å"byte†. – A group of 4 bits is called a â€Å"nibble†. – Also, 32 bit groups were given the name â€Å"long word†. †¢ Today, all processors manipulate at least 32 bits at a time and there exists microprocessors that can process 64, 80, 128 bits Definition (Contd. ) – Arithmetic and Logic Operations: Every microprocessor has arithmetic operations such as add and subtract as part of its instruction set. – Most microprocessors will have operations such as multiply and divide. – Some of the newer ones will have complex operations such as square root. †¢ In addition, microprocessors have logic operations as well. Such as AND, OR, XOR, shift left, shift right, etc. †¢ Again, the number and types of operations define the microprocessor’s instruction set and depends on the specific microprocessor. Definition (Contd. ) – Stored in memory : †¢ First, what is memory? – Memory is the location where information is kept while not in current use. Memory is a collection of storage devices. Usually, each storage device holds one bit. Also, in most kinds of memory, these storage devices are grouped into groups of 8. These 8 storage locations can only be accessed together. So, one can only read or write in terms of bytes to and form memory. – Memory is usually measured by the number of bytes it can hold. It is measured in Kilos, Megas and lately Gigas. A Kilo in computer language is 210 =1024. So, a KB (KiloByte) is 1024 bytes. Mega is 1024 Kilos and Giga is 1024 Mega. Definition (Contd. ) – Stored in memory: †¢ When a program is entered into a computer, it is st ored in memory.Then as the microprocessor starts to execute the instructions, it brings the instructions from memory one at a time. †¢ Memory is also used to hold the data. – The microprocessor reads (brings in) the data from memory when it needs it and writes (stores) the results into memory when it is done. Definition (Contd. ) – Produces: For the user to see the result of the execution of the program, the results must be presented in a human readable form. †¢ The results must be presented on an output device. †¢ This can be the monitor, a paper from the printer, a simple LED or many other forms. A Microprocessor-based systemFrom the above description, we can draw the following block diagram to represent a microprocessor-based system: Input Output Memory Inside The Microprocessor †¢ Internally, the microprocessor is made up of 3 main units. – The Arithmetic/Logic Unit (ALU) – The Control Unit. – An array of registers for holdi ng data while it is being manipulated. Organization of a microprocessorbased system †¢ Let’s expand the picture a bit. I/O Input / Output ALU Register Array System Bus Memory ROM RAM Control Memory †¢ Memory stores information such as instructions and data in binary format (0 and 1).It provides this information to the microprocessor whenever it is needed. †¢ Usually, there is a memory â€Å"sub-system† in a microprocessor-based system. This sub-system includes: – The registers inside the microprocessor – Read Only Memory (ROM) †¢ used to store information that does not change. – Random Access Memory (RAM) (also known as Read/Write Memory). †¢ used to store information supplied by the user. Such as programs and data. Memory Map and Addresses †¢ The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Address Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip 8FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip Memory †¢ To execute a program: – the user enters its instructions in binary format into the memory. – The microprocessor then reads these instructions and whatever data is needed from memory, executes the instructions and places the results either in memory or produces it on an output device. The three cycle instruction execution model To execute a program, the microprocessor â€Å"reads† each instruction from memory, â€Å"interprets† it, then â€Å"executes† it. †¢ To use the right names for the cycles: – The microprocessor fetches each instruction, – decodes it, – Then executes it. †¢ This sequence is continued until all instructions are performed. Machine Language †¢ The number of bits tha t form the â€Å"word† of a microprocessor is fixed for that particular processor. – These bits define a maximum number of combinations. †¢ For example an 8-bit microprocessor can have at most 28 = 256 different combinations. However, in most microprocessors, not all of these combinations are used. – Certain patterns are chosen and assigned specific meanings. – Each of these patterns forms an instruction for the microprocessor. – The complete set of patterns makes up the microprocessor’s machine language. The 8085 Machine Language †¢ The 8085 (from Intel) is an 8-bit microprocessor. – The 8085 uses a total of 246 bit patterns to form its instruction set. – These 246 patterns represent only 74 instructions. †¢ The reason for the difference is that some (actually most) instructions have multiple different formats. Because it is very difficult to enter the bit patterns correctly, they are usually entered in hexadeci mal instead of binary. †¢ For example, the combination 0011 1100 which translates into â€Å"increment the number in the register called the accumulator†, is usually entered as 3C. Assembly Language †¢ Entering the instructions using hexadecimal is quite easier than entering the binary combinations. – However, it still is difficult to understand what a program written in hexadecimal does. – So, each company defines a symbolic code for the instructions. – These codes are called â€Å"mnemonics†. The mnemonic for each instruction is usually a group of letters that suggest the operation performed. Assembly Language †¢ Using the same example from before, – 00111100 translates to 3C in hexadecimal (OPCODE) – Its mnemonic is: â€Å"INR A†. – INR stands for â€Å"increment register† and A is short for accumulator. †¢ Another example is: 1000 0000, – Which translates to 80 in hexadecimal. â€⠀œ Its mnemonic is â€Å"ADD B†. – â€Å"Add register B to the accumulator and keep the result in the accumulator†. Assembly Language †¢ It is important to remember that a machine language and its associated assembly language are completely machine dependent. In other words, they are not transferable from one microprocessor to a different one. †¢ For example, Motorolla has an 8-bit microprocessor called the 6800. – The 8085 machine language is very different from that of the 6800. So is the assembly language. – A program written for the 8085 cannot be executed on the 6800 and vice versa. â€Å"Assembling† The Program †¢ How does assembly language get translated into machine language? – There are two ways: – 1st there is â€Å"hand assembly†. †¢ The programmer translates each assembly language instruction into its equivalent hexadecimal code (machine language).Then the hexadecimal code is entered into memory. – The other possibility is a program called an â€Å"assembler†, which does the translation automatically. 8085 Microprocessor Architecture †¢ †¢ †¢ †¢ †¢ †¢ 8-bit general purpose  µp Capable of addressing 64 k of memory Has 40 pins Requires +5 v power supply Can operate with 3 MHz clock 8085 upward compatible Pins Power Supply: +5 V Frequency Generator is connected to those pins Input/Output/ Memory Read Write Multiplexed Address Data Bus Address latch Enable Address Bus †¢ System Bus – wires connecting memory & I/O to microprocessor – Address Bus Unidirectional †¢ Identifying peripheral or memory location – Data Bus †¢ Bidirectional †¢ Transferring data – Control Bus †¢ Synchronization signals †¢ Timing signals †¢ Control signal Architecture of Intel 8085 Microprocessor Intel 8085 Microprocessor †¢ Microprocessor consists of: – – – – – Control unit: control microprocessor operations. ALU: performs data processing function. Registers: provide storage internal to CPU. Interrupts Internal data bus The ALU †¢ In addition to the arithmetic & logic circuits, the ALU includes the accumulator, which is part of every arithmetic & logic operation. Also, the ALU includes a temporary register used for holding data temporarily during the execution of the operation. This temporary register is not accessible by the programmer. †¢ Registers – General Purpose Registers †¢ B, C, D, E, H & L (8 bit registers) †¢ Can be used singly †¢ Or can be used as 16 bit register pairs – BC, DE, HL †¢ H & L can be used as a data pointer (holds memory address) – Special Purpose Registers †¢ Accumulator (8 bit register) – Store 8 bit data – Store the result of an operation – Store 8 bit data during I/O transfer Accumulator Flags B C D E H L Program Counter Stack Pointer Address 6 8 Data †¢ Flag Register – 8 bit register – shows the status of the microprocessor before/after an operation – S (sign flag), Z (zero flag), AC (auxillary carry flag), P (parity flag) & CY (carry flag) D7 S D6 Z D5 X D4 AC D3 X D2 P D1 X D0 CY – Sign Flag †¢ Used for indicating the sign of the data in the accumulator †¢ The sign flag is set if negative (1 – negative) †¢ The sign flag is reset if positive (0 –positive) †¢ Zero Flag – Is set if result obtained after an operation is 0 – Is set following an increment or decrement operation of that register 10110011 + 01001101 ————–1 00000000 †¢ Carry Flag Is set if there is a carry or borrow from arithmetic operation 1011 0101 + 0110 1100 ————–Carry 1 0010 0001 1011 0101 – 1100 1100 ————–Borrow 1 1110 1001 †¢ Auxillary Carry Flag – Is set if there is a carry out of bit 3 †¢ Parity Flag – Is set if parity is even – Is cleared if parity is odd The Internal Architecture †¢ We have already discussed the general purpose registers, the Accumulator, and the flags. †¢ The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. Since it holds an address, it must be 16 bits wide. The Internal Architecture †¢ The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion. Non Programmable Registers †¢ Instruction Register & Decoder – Inst ruction is stored in IR after fetched by processor – Decoder decodes instruction in IR Internal Clock generator – 3. 125 MHz internally – 6. 5 MHz externally The Address and Data Busses †¢ The address bus has 8 signal lines A8 – A15 which are unidirectional. †¢ The other 8 address bits are multiplexed (time shared) with the 8 data bits. – So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 and D0 – D7 at the same time. †¢ During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. – In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. Demultiplexing AD7-AD0 From the above description, it becomes obvious that the AD7– AD0 lines are serving a dual purpose and that they need to be demultiplexed to get all the information. – The high order bits of the address remain on the bus for three clock periods. However, the low order bits remain for only one clock period and they would be lost if they are not saved externally. Also, notice that the low order bits of the address disappear when they are needed most. – To make sure we have the entire address for the full three clock cycles, we will use an external latch to save the value of AD7– AD0 when it is carrying the address bits.We use the ALE signal to enable this latch. Demultiplexing AD7-AD0 8085 A15-A8 ALE AD7-AD0 Latch A7- A0 D7- D0 – Given that ALE operates as a pulse during T1, we will be able to latch the address. Then when ALE goes low, the address is saved and the AD7– AD0 lines can be used for their purpose as the bi-directional data lines. Demultiplexing the Bus AD7 – AD0 †¢ †¢ †¢ †¢ The high order address is placed on the address bus and hold for 3 clk periods, The low o rder address is lost after the first clk period, this address needs to be hold however we need to use latch The address AD7 – AD0 is connected as inputs to the latch 74LS373.The ALE signal is connected to the enable (G) pin of the latch and the OC – Output control – of the latch is grounded The Overall Picture †¢ Putting all of the concepts together, we get: A15- A10 Chip Selection Circuit 8085 A15-A8 ALE AD7-AD0 Latch CS A9- A0 A7- A0 1K Byte Memory Chip WR RD IO/M D7- D0 RD WR Introduction to 8085 Instructions The 8085 Instructions – Since the 8085 is an 8-bit device it can have up to 28 (256) instructions. †¢ However, the 8085 only uses 246 combinations that represent a total of 74 instructions. – Most of the instructions have more than one format. These instructions can be grouped into five different groups: †¢ †¢ †¢ †¢ †¢ Data Transfer Operations Arithmetic Operations Logic Operations Branch Operations Machin e Control Operations Instruction and Data Formats †¢ Each instruction has two parts. – The first part is the task or operation to be performed. †¢ This part is called the â€Å"opcode† (operation code). – The second part is the data to be operated on †¢ Called the â€Å"operand†. Data Transfer Operations – These operations simply COPY the data from the source to the destination. – MOV, MVI, LDA, and STA – They transfer: †¢ †¢ †¢ †¢ Data between registers.Data Byte to a register or memory location. Data between a memory location and a register. Data between an IO Device and the accumulator. – The data in the source is not changed. The LXI instruction †¢ The 8085 provides an instruction to place the 16-bit data into the register pair in one step. †¢ LXI Rp, (Load eXtended Immediate) – The instruction LXI B 4000H will place the 16-bit number 4000 into the register pair B, C. â₠¬ ¢ The upper two digits are placed in the 1st register of the pair and the lower two digits in the 2nd . B 40 00 C LXI B 40 00H The Memory â€Å"Register† Most of the instructions of the 8085 can use a memory location in place of a register. – The memory location will become the â€Å"memory† register M. †¢ MOV M B – copy the data from register B into a memory location. – Which memory location? †¢ The memory location is identified by the contents of the HL register pair. – The 16-bit contents of the HL register pair are treated as a 16-bit address and used to identify the memory location. Using the Other Register Pairs – There is also an instruction for moving data from memory to the accumulator without disturbing the contents of the H and L register. †¢ LDAX Rp (LoaD Accumulator eXtended) Copy the 8-bit contents of the memory location identified by the Rp register pair into the Accumulator. – This instruction o nly uses the BC or DE pair. – It does not accept the HL pair. Indirect Addressing Mode †¢ Using data in memory directly (without loading first into a Microprocessor’s register) is called Indirect Addressing. †¢ Indirect addressing uses the data in a register pair as a 16-bit address to identify the memory location being accessed. – The HL register pair is always used in conjunction with the memory register â€Å"M†. – The BC and DE register pairs can be used to load data into the Accumultor using indirect addressing.Arithmetic Operations – Addition (ADD, ADI): – Any 8-bit number. – The contents of a register. – The contents of a memory location. †¢ Can be added to the contents of the accumulator and the result is stored in the accumulator. – Subtraction (SUB, SUI): – Any 8-bit number – The contents of a register – The contents of a memory location †¢ Can be subtracted from the contents of the accumulator. The result is stored in the accumulator. Arithmetic Operations Related to Memory †¢ These instructions perform an arithmetic operation using the contents of a memory location while they are still in memory. ADD – SUB – INR M M M / DCR M †¢ Add the contents of M to the Accumulator †¢ Sub the contents of M from the Accumulator †¢ Increment/decrement the contents of the memory location in place. – All of these use the contents of the HL register pair to identify the memory location being used. Arithmetic Operations – Increment (INR) and Decrement (DCR): †¢ The 8-bit contents of any memory location or any register can be directly incremented or decremented by 1. †¢ No need to disturb the contents of the accumulator. Manipulating Addresses †¢ Now that we have a 16-bit address in a register pair, how do we manipulate it? It is possible to manipulate a 16-bit address stored in a register pair as one entity using some special instructions. †¢ INX Rp †¢ DCX Rp (Increment the 16-bit number in the register pair) (Decrement the 16-bit number in the register pair) – The register pair is incremented or decremented as one entity. No need to worry about a carry from the lower 8-bits to the upper. It is taken care of automatically. Logic Operations †¢ These instructions perform logic operations on the contents of the accumulator. – ANA, ANI, ORA, ORI, XRA and XRI †¢ Source: Accumulator and – An 8-bit number – The contents of a register – The contents of a memory location Destination: Accumulator ANA R/M ANI # ORA ORI XRA XRI R/M # R/M # AND Accumulator With Reg/Mem AND Accumulator With an 8-bit number OR Accumulator With Reg/Mem OR Accumulator With an 8-bit number XOR Accumulator With Reg/Mem XOR Accumulator With an 8-bit number Logic Operations – Complement: †¢ 1’s complement of the contents of the accumulato r. CMA No operand Additional Logic Operations †¢ Rotate – Rotate the contents of the accumulator one position to the left or right. – RLC – RAL – RRC – RAR Rotate the accumulator left. Bit 7 goes to bit 0 AND the Carry flag. Rotate the accumulator left through the carry.Bit 7 goes to the carry and carry goes to bit 0. Rotate the accumulator right. Bit 0 goes to bit 7 AND the Carry flag. Rotate the accumulator right through the carry. Bit 0 goes to the carry and carry goes to bit 7. RLC vs. RLA Carry Flag †¢ RLC 7 6 5 4 3 2 1 0 Accumulator Carry Flag †¢ RAL 7 6 5 4 3 2 1 0 Accumulator Logical Operations †¢ Compare †¢ Compare the contents of a register or memory location with the contents of the accumulator. – CMP R/M Compare the contents of the register or memory location to the contents of the accumulator. Compare the 8-bit number to the contents of the accumulator. CPI # †¢ The compare instruction sets the flag s (Z, Cy, and S). †¢ The compare is done using an internal subtraction that does not change the contents of the accumulator. A – (R / M / #) Branch Operations †¢ Two types: – Unconditional branch. †¢ Go to a new location no matter what. – Conditional branch. †¢ Go to a new location if the condition is true. Unconditional Branch – JMP Address †¢ Jump to the address specified (Go to). – CALL Address †¢ Jump to the address specified but treat it as a subroutine. – RET †¢ Return from a subroutine. – The addresses supplied to all branch operations must be 16-bits.Conditional Branch – Go to new location if a specified condition is met. †¢ JZ Address (Jump on Zero) – Go to address specified if the Zero flag is set. †¢ JNZ Address (Jump on NOT Zero) – Go to address specified if the Zero flag is not set. †¢ JC Address (Jump on Carry) – Go to the address specified if the Carry flag is set. †¢ JNC Address (Jump on No Carry) – Go to the address specified if the Carry flag is not set. †¢ JP †¢ JM Address (Jump on Plus) Address (Jump on Minus) – Go to the address specified if the Sign flag is not set – Go to the address specified if the Sign flag is set.Machine Control – HLT †¢ Stop executing the program. – NOP †¢ No operation †¢ Exactly as it says, do nothing. †¢ Usually used for delay or to replace instructions during debugging. Operand Types †¢ There are different ways for specifying the operand: – There may not be an operand (implied operand) †¢ CMA – The operand may be an 8-bit number (immediate data) †¢ ADI 4FH – The operand may be an internal register (register) †¢ SUB B – The operand may be a 16-bit address (memory address) †¢ LDA 4000H Instruction Size †¢ Depending on the operand type, the instruction may have diff erent sizes.It will occupy a different number of memory bytes. – Typically, all instructions occupy one byte only. – The exception is any instruction that contains immediate data or a memory address. †¢ Instructions that include immediate data use two bytes. – One for the opcode and the other for the 8-bit data. †¢ Instructions that include a memory address occupy three bytes. – One for the opcode, and the other two for the 16-bit address. Instruction with Immediate Date †¢ Operation: Load an 8-bit number into the accumulator. – MVI A, 32 †¢ Operation: MVI A †¢ Operand: The number 32 †¢ Binary Code: 0011 1110 3E 1st byte. 011 0010 32 2nd byte. Instruction with a Memory Address †¢ Operation: go to address 2085. – Instruction: JMP 2085 †¢ Opcode: JMP †¢ Operand: 2085 †¢ Binary code: 1100 0011 C3 1000 0101 85 0010 0000 20 1st byte. 2nd byte 3rd byte Addressing Modes †¢ The microprocessor ha s different ways of specifying the data for the instruction. These are called â€Å"addressing modes†. †¢ The 8085 has four addressing modes: – – – – Implied Immediate Direct Indirect CMA MVI B, 45 LDA 4000 LDAX B †¢ Load the accumulator with the contents of the memory location whose address is stored in the register pair BC). Data Formats In an 8-bit microprocessor, data can be represented in one of four formats: †¢ †¢ †¢ †¢ ASCII BCD Signed Integer Unsigned Integer. – It is important to recognize that the microprocessor deals with 0’s and 1’s. †¢ It deals with values as strings of bits. †¢ It is the job of the user to add a meaning to these strings. Data Formats †¢ Assume the accumulator contains the following value: 0100 0001. – There are four ways of reading this value: †¢ It is an unsigned integer expressed in binary, the equivalent decimal number would be 65. †¢ It is a number expressed in BCD (Binary Coded Decimal) format. That would make it, 41. It is an ASCII representation of a letter. That would make it the letter A. †¢ It is a string of 0’s and 1’s where the 0th and the 6th bits are set to 1 while all other bits are set to 0. ASCII stands for American Standard Code for Information Interchange. Counters & Time Delays Counters †¢ A loop counter is set up by loading a register with a certain value †¢ Then using the DCR (to decrement) and INR (to increment) the contents of the register are updated. †¢ A loop is set up with a conditional jump instruction that loops back or not depending on whether the count has reached the termination count.Counters †¢ The operation of a loop counter can be described using the following flowchart. Initialize Body of loop Update the count No Is this Final Count? Yes Sample ALP for implementing a loop Using DCR instruction MVI C, 15H LOOP DCR C JNZ LOOP Using a Regist er Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. †¢ It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP Delays †¢ It was shown in Chapter 2 that each instruction passes through different combinations of Fetch, Memory Read, and Memory Write cycles. †¢ Knowing the combinations of cycles, one can calculate how long such an instruction would require to complete. The table in Appendix F of the book contains a column with the title B/M/T. – B for Number of Bytes – M for Number of Machine Cycles – T for Number of T-State. Delays †¢ Knowing how many T-States an instruction requires, and keeping in mind that a T-State is one clock cycle long, we can calculate the time using the following formula: Delay = No. of T-States / Frequency †¢ For example a â€Å"MVI† instruction uses 7 T-States. Therefore, if the Microprocessor is running at 2 MHz, the instruction would require 3. 5  µSeconds to complete. Delay loops †¢ We can use a loop to produce a certain amount of time delay in a program. The following is an example of a delay loop: MVI C, FFH LOOP DCR C JNZ LOOP 7 T-States 4 T-States 10 T-States †¢ The first instruction initializes the loop counter and is executed only once requiring only 7 T-States. †¢ The following two instructions form a loop that requires 14 T-States to execute and is repeated 255 times until C becomes 0. Del ay Loops (Contd. ) †¢ We need to keep in mind though that in the last iteration of the loop, the JNZ instruction will fail and require only 7 T-States rather than the 10. †¢ Therefore, we must deduct 3 T-States from the total delay to get an accurate delay calculation. To calculate the delay, we use the following formula: Tdelay = TO + TL – Tdelay = total delay – TO = delay outside the loop – TL = delay of the loop †¢ TO is the sum of all delays outside the loop. Delay Loops (Contd. ) †¢ Using these formulas, we can calculate the time delay for the previous example: †¢ TO = 7 T-States – Delay of the MVI instruction †¢ TL = (14 X 255) – 3 = 3567 T-States – 14 T-States for the 2 instructions repeated 255 times (FF16 = 25510) reduced by the 3 T-States for the final JNZ. Using a Register Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. – However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a delay loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP 10 T-States 6 T-States 4 T-States 4 T-States 10 T-StatesUsing a Register Pair as a Loop Counter †¢ Using the same formula from before, we can calculate: †¢ TO = 10 T-States – The delay for the LXI instruction †¢ TL = (24 X 4096) – 3 = 98301 T- States – 24 T-States for the 4 instructions in the loop repeated 4096 times (100016 = 409610) reduced by the 3 TStates for the JNZ in the last iterat ion. Nested Loops †¢ Nested loops can be easily setup in Assembly language by using two registers for the two loop counters and updating the right register in the right loop. – In the figure, the body of loop2 can be before or after loop1.Initialize loop 2 Body of loop 2 Initialize loop 1 Body of loop 1 Update the count1 No Is this Final Count? Yes Update the count 2 No Is this Final Count? Yes Nested Loops for Delay †¢ Instead (or in conjunction with) Register Pairs, a nested loop structure can be used to increase the total delay produced. MVI B, 10H LOOP2 MVI C, FFH LOOP1 DCR C JNZ LOOP1 DCR B JNZ LOOP2 7 T-States 7 T-States 4 T-States 10 T-States 4 T-States 10 T-States Delay Calculation of Nested Loops †¢ The calculation remains the same except that it the formula must be applied recursively to each loop. Start with the inner loop, then plug that delay in the calculation of the outer loop. †¢ Delay of inner loop – TO1 = 7 T-States †¢ MVI C, FFH instruction – TL1 = (255 X 14) – 3 = 3567 T-States †¢ 14 T-States for the DCR C and JNZ instructions repeated 255 Delay Calculation of Nested Loops †¢ Delay of outer loop – TO2 = 7 T-States †¢ MVI B, 10H instruction – TL1 = (16 X (14 + 3574)) – 3 = 57405 T-States †¢ 14 T-States for the DCR B and JNZ instructions and 3574 T-States for loop1 repeated 16 times (1016 = 1610) minus 3 for the final JNZ. – TDelay = 7 + 57405 = 57412 T-States †¢ Total Delay – TDelay = 57412 X 0. 5  µSec = 28. 06 mSec Increasing the delay †¢ The delay can be further increased by using register pairs for each of the loop counters in the nested loops setup. †¢ It can also be increased by adding dummy instructions (like NOP) in the body of the loop. Timing Diagram Representation of Various Control signals generated during Execution of an Instruction. Following Buses and Control Signals must be shown in a Timing Diagram: â € ¢Higher Order Address Bus. †¢Lower Address/Data bus †¢ALE †¢RD †¢WR †¢IO/M Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78 Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78OFC 8085 Memory Timing Diagram Instruction: A000h MOV A,B 00h T1 T2 T3 T4 A0h A15- A8 (Higher Order Address bus) Corresponding Coding: A000h 78 78h ALE RD OFC WR 8085 Memory IO/M Op-code fetch Cycle Timing Diagram Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 Timing Diagram Instruction: A000h MVI A,45h OFC MEMR Corresponding Coding: A000h A001h 3E 45 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h A0h A15- A8 (Higher Order Address bus) 00h 3Eh 01h 45h DA7-DA0 (Lower order address/data Bus) Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 WR RD ALEIO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h LXI A,FO45h Corresponding Coding: A000h A001h A002h 21 45 F0 Timing Dia gram Instruction: A000h LXI A,FO45h OFC MEMR MEMR Corresponding Coding: A000h A001h A002h 21 45 F0 8085 Memory Timing Diagram Op-Code Fetch Cycle Memory Read Cycle Memory Read Cycle T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 A0h A0h A0h A15- A8 (Higher Order Address bus) 00h 21h 01h 45h 02h F0h DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Timing Diagram Instruction: A000h MOV A,M Corresponding Coding: A000h 7E Timing Diagram Instruction: A000h MOV A,MOFC MEMR Corresponding Coding: A000h 7E 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus) Instruction: A000h MOV A,M Corresponding Coding: A000h 7E 00h 7Eh L Reg Content Of M DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h MOV M,A Corresponding Coding: A000h 77 Timing Diagram Instruction: A000h MOV M,A OFC MEMW Corresponding Coding: A000h 77 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus)Instruction: A000h MOV M,A Corresponding Coding: A000h 77 00h 7Eh L Reg Content of Reg A DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Write Cycle Chapter 9 Stack and Subroutines The Stack †¢ The stack is an area of memory identified by the programmer for temporary storage of information. †¢ The stack is a LIFO structure. – Last In First Out. †¢ The stack normally grows backwards into memory. – In other words, the programmer defines the bottom of the stack and the stack grows up into reducing address range. The Stack grows backwards into memory Memory Bottom of the Stack The Stack Given that the stack grows backwards into memory, it is customary to place the bottom of the stack at the end of memory to keep it as far away from user programs as possible. †¢ In the 8085, the stack is defined by setting the SP (Stack Pointer) register. LXI SP, FFFFH †¢ This sets the Stack Pointer to location FFFFH (end of memory for the 8085). Saving Information on the Stack †¢ Information is saved on the stack by PUSHing it on. – It is retrieved from the stack by POPing it off. †¢ The 8085 provides two instructions: PUSH and POP for storing information on the stack and retrieving it back. – Both PUSH and POP work with register pairs ONLY.The PUSH Instruction †¢ PUSH B – Decrement SP – Copy the contents of register B to the memory location pointed to by SP – Decrement BSP C F3 12 – Copy the contents of register C to the memory location pointed to by SP F3 FFFB FFFC FFFD FFFE FFFF 12 SP The POP Instruction †¢ POP D – Copy the contents of the memory location pointed to by the SP to register E – Increment SP – Copy the contents of the memory location D E F3 12 pointed to by the SP to register D – Increment SP F3 SP FFFB FFFC FFFD FFFE FFFF 12 Operation of the Stack †¢ During pushing, the stack operates in a â€Å"decrement then store† style. The stack pointer is decremented first, then the information is placed on the stack. †¢ During poping, the stack operates in a â€Å"use then increment† style. – The information is retrieved from the top of the the stack and then the pointer is incremented. †¢ The SP pointer always points to â€Å"the top of the stack†. LIFO †¢ The order of PUSHs and POPs must be opposite of each other in order to retrieve information back into its original location. PUSH B PUSH D †¦ POP D POP B The PSW Register Pair †¢ The 8085 recognizes one additional register pair called the PSW (Program Status Word). This register pair is made up of the Accumulator and the Flags registers. †¢ It is possible to push the PSW onto the stack, do whatever operations are needed, then POP it off of the stack. – The result is that the contents of the Accumulator and the status of the Flags are ret urned to what they were before the operations were executed. Subroutines †¢ A subroutine is a group of instructions that will be used repeatedly in different locations of the program. – Rather than repeat the same instructions several times, they can be grouped into a subroutine that is called from the different locations. In Assembly language, a subroutine can exist anywhere in the code. – However, it is customary to place subroutines separately from the main program. Subroutines †¢ The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RTE insutruction is used to return the execution to the calling routine. The CALL Instruction †¢ CALL 4000H – Push the address of the instruction immediately following the CALL onto the stack 2000 CALL 4000 2003 counter – Load the program PC 2 0 0 3with the 16-bit address supplied with the CALL instructi on. FFFB FFFC FFFD FFFE FFFF 3 20 SP The RTE Instruction †¢ RTE – Retrieve the return address from the top of the stack – Load the program counter with the return address. 2003 PC 4014 4015 †¦ RTE FFFB FFFC FFFD FFFE FFFF 03 20 SP Cautions †¢ The CALL instruction places the return address at the two memory locations immediately before where the Stack Pointer is pointing. – You must set the SP correctly BEFORE using the CALL instruction. †¢ The RTE instruction takes the contents of the two memory locations at the top of the stack and uses these as the return address. – Do not modify the stack pointer in a subroutine. You will loose the return address.Passing Data to a Subroutine †¢ In Assembly Language data is passed to a subroutine through registers. – The data is stored in one of the registers by the calling program and the subroutine uses the value from the register. †¢ The other possibility is to use agreed upon mem ory locations. – The calling program stores the data in the memory location and the subroutine retrieves the data from the location and uses it. Call by Reference and Call by Value †¢ If the subroutine performs operations on the contents of the registers, then these modifications will be transferred back to the calling program upon returning from a subroutine. Call by reference †¢ If this is not desired, the subroutine should PUSH all the registers it needs on the stack on entry and POP them on return. – The original values are restored before execution returns to the calling program. Cautions with PUSH and POP †¢ PUSH and POP should be used in opposite order. †¢ There has to be as many POP’s as there are PUSH’s. – If not, the RET statement will pick up the wrong information from the top of the stack and the program will fail. †¢ It is not advisable to place PUSH or POP inside a loop. Conditional CALL and RTE Instructions à ¢â‚¬ ¢ The 8085 supports conditional CALL and conditional RTE instructions. The same conditions used with conditional JUMP instructions can be used. – – – – – CC, call subroutine if Carry flag is set. CNC, call subroutine if Carry flag is not set RC, return from subroutine if Carry flag is set RNC, return from subroutine if Carry flag is not set Etc. A Proper Subroutine †¢ According to Software Engineering practices, a proper subroutine: – Is only entered with a CALL and exited with an RTE – Has a single entry point †¢ Do not use a CALL statement to jump into different points of the same subroutine. – Has a single exit point †¢ There should be one return statement from any subroutine. Following these rules, there should not be any confusion with PUSH and POP usage. The Design and Operation of Memory Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into t wo main types: ? ? Main memory (RAM and ROM) Storage memory (Disks , CD ROMs, etc. ) The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). ? ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information. The number of flip-flops in a â€Å"memory register† determines the size of the memory word. Accessing Information in Memory For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: Select the right memory chip (using part of the address bus). Identify the memory location (using the rest of the address bus). Access the data (using the data bus). 2 Tri-State Buffers An important circuit element that is used extensively in memory. This buffer is a logic circuit that has three states: Logic 0, logic1, and high impedance. When this circuit is in high impedance mode it looks as if it is disconnected from the output completely.The Outp ut is Low The Output is High High Impedance 3 The Tri-State Buffer This circuit has two inputs and one output. The first input behaves like the normal input for the circuit. The second input is an â€Å"enable†. ? ? If it is set high, the output follows the proper circuit behavior. If it is set low, the output looks like a wire connected to nothing. Output Input OR Input Output Enable Enable 4 The Basic Memory Element The basic memory element is similar to a D latch. This latch has an input where the data comes in. It has an enable input and an output on which data comes out. Data Input D Data Output QEnable EN 5 The Basic Memory Element However, this is not safe. Data is always present on the input and the output is always set to the contents of the latch. To avoid this, tri-state buffers are added at the input and output of the latch. Data Input D Data Output Q RD Enable EN WR 6 The Basic Memory Element The WR signal controls the input buffer. The bar over WR means that thi s is an active low signal. So, if WR is 0 the input data reaches the latch input. If WR is 1 the input of the latch looks like a wire connected to nothing. The RD signal controls the output in a similar manner. A Memory â€Å"Register† If we take four of these latches and connect them together, we would have a 4-bit memory register I0 WR I1 I2 I3 D Q EN EN RD D Q EN D Q EN D Q EN O0 O1 O2 O3 8 A group of memory registers D0 o D1 o o D2 o D3 WR D EN Q D EN Q D EN Q D EN Q D Q D EN Q D EN Q D EN Q Expanding on this scheme to add more memory registers we get the diagram to the right. EN D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q o o o o RD D0 D1 D2 9 D3 Externally Initiated Operations External devices can initiate (start) one of the 4 following operations: Reset ?All operations are stopped and the program counter is reset to 0000. The microprocessor’s operations are interrupted and the microprocessor executes what is called a â€Å"service routine†. Th is routine â€Å"handles† the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues. Interrupt ? ? 10 A group of Memory Registers If we represent each memory location (Register) as a block we get the following I0 I1 I2 I3 WR EN0 EN1 EN2 EN3 RD O0 Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers O1 O2 O3 11The Design of a Memory Chip Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location]. 12 The Enable Inputs How do we produce these enable line? Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of line s coming into the chip.These encoded lines are the address lines for memory. 13 The Design of a Memory Chip So, the previous diagram would now look like the following: I I I I 0 1 2 3 WR A d d r e s s D e c o d e r Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers A1 A0 RD O0 O1 O2 O3 14 The Design of a Memory Chip Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. Input Buffers WR A1 A0 A D The chip Memory Reg. now look likeDthis: would 0 d e 0 D0 A1 A0 D1 D2 D3 d r e s s c o d e r Memory Reg. 1 Memory Reg. 2 Memory Reg. Output Buffers D1 D2 D3 RD RD WR 15 The steps of writing into Memory What happens when the programmer issues the STA instruction? The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. The da ta is then applied on the data lines and it is stored into the enabled register. 16 Dimensions of Memory Memory is usually measured by two numbers: its length and its width (Length X Width). ? ? The length is the total number of locations.The width is the number of bits in each location. The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) 210 = 1024 locations (1K) ? So, a memory chip with 10 address lines would have Looking at it from the other side, a memory chip with 4K locations would need ? Log2 4096=12 address lines 17 The 8085 and Memory The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. ow would we use these address lines to control the multiple chips? 18 Chip Select Usually, each memory chip has a CS (Chip Select) input. The chip wil l only work if an active signal is applied on that input. To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of â€Å"chip selection†. These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used. 19 Chip Selection Example Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier.We will need to use 2 inputs and a decoder to identify which chip will be used at what time. The resulting design would now look like the one on the following slide. 20 Chip Selection Example RD WR D0 D1 RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS A0 A1 A2 A3 2 X4 Decoder 21 Memory Map and Addresses The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Ad dress Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip 22 Address Range of a Memory Chip The address range of a particular chip is the list of all addresses that are mapped to the chip. An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. †¢ Each box has its unique number that is assigned sequentially. (memory locations) †¢ The boxes are grouped into groups. (memory chips) †¢ The first box in a group has the number immediately after the last box in the previous group. 23 Address Range of a Memory ChipThe above example can be modified slightly to make it closer to our discussion on memory. †¢ Let’s say that this post office has only 1000 boxes. †¢ Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 01 99 are in group 1 and so on. We can look at the box number as if it is made up of two pieces: †¢ The group number and the box’s index within the group. †¢ So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group. 24The 8085 and Address Ranges The 8085 has 16 address lines. So, it can address a total of 64K memory locations. If we use memory chips with 1K locations each, then we will need 64 such chips. The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log21024 = 10) That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log264 = 6). 25 The 8085 and Address Ranges Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 Chip Selection Location Selection within the ChipDepending on the combination on the address lines A15 – A10 , the address range of the specified chip is determined. 26 Chip Select Example A chip that uses the combination A15 – A10 = 001000 would have addresses that range from 2000H to 23FFH. Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. The memory chip in this example would require the following circuit on its chip select input: A 10 A 11 A 12 A 13 A 14 A 15 CS 27 Chip Select Example If we change the above combination to the following: A 10 A 11 A 12 A 13 A 14 A 15 CSNow the chip would have addresses ranging from: 2400 to 27FF. Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. 28 Chip Select Example To illustrate this with a picture: ? ? in the first case, the memory chip occupies the piece of the memory map identified as before. In the second case, it occupies the piece identified as after. Before Af ter 0000 2000 23FF 2400 27FF 0000 FFFF FFFF 29 High-Order vs. Low-Order Address Lines The address lines from a microprocessor can be classified into two types: High-Order ? Low-Order ?