Saturday, August 31, 2019

Patience by Damian Marley Featuring Nas Essay

The title of my chosen song is called Patience by Damian Marley Featuring Nas. I chose this poem because of its spiritual meaning and because it represents what our world has turned into. Even though its six years old, and the world has changed a lot since then, they made a very precise prediction of what the condition of our economy will be today. The poem was written by Nas and Damian Marley themselves in year 2008 and composed in 2010. Damian Marley is the son of a popular Jamaican Reggae artist named Bob Marley. His father was a legend whose music was influenced by social issues of his homeland and politics and economics. Damian Marley took after his father and majority of his songs are about social issues, making love and peace. Damian Marley is also strongly connected to his spiritual side just like his father was, which is why I love their music. The purpose of this song was to make you think about our creation, and our surroundings. Is God real? Why were we born? What’s true intelligence, the kind you learn at school, or the kind that comes to you from experience and spiritual wisdom? The topic of this song is Social Issues. â€Å"Who made up words? Who made up numbers? And what kind of spell is mankind under? Everything on the planet we preserve and can it microwaved it and preserved it, and try it no matter what we’ll survive it, what’s man? What’s human? Anything along the land we consuming eatin’, deletin’, ruin, trying to get paper gotta have land, gotta have acres. † I quoted this because it shows what the poem is about and it’s intended meaning. The artists asked a lot of questions, so while we are listening to the song, these questions be absorbed by our sub-conscious mind and we will start to think about the world and wonder why our lifestyle’s are filled with media influences and social networking. The overall mood and feeling in this song is a drifting hypnotic feeling. The reggae and rap mixed together gives it a slow feel, but since the wording is so strong is makes you focus directly on what the artists are rapping about. The instruments chosen in this song are very strong, but played at a slow and relaxing melody. Damian Marley and Nas are asking questions and talking to people, but you don’t know who the song is for or what it’s about, it’s for you to interpret it in your own way, so the poetic device used in this song is â€Å"apostrophe†. Huh, we born not knowing, are we born knowing all? We growing wiser, are we just growing tall? Can you read thoughts, can you read palms? shows that they are trying to get you to interpret the meaning in your own way. The overall message in this song is to realize that we were put on this earth for a reason, and it is relevant to today’s society because we often forget where we come from and we pay too much attention to the media, and our lives are all about trying to fit in. Some of the worst paparazzi I’ve ever seen and I ever known, put the worst on display so the world can see and that’s all they will ever show. † This quote is to show how the media and news only portray negative messages, so when Damian Marley says â€Å"That’s all you will ever know† it is to show that the media makes us insecure so we only see the worst in ourselves. This is a very respectful and meaningful song and I think everyone should learn from it.

Friday, August 30, 2019

Central Processing Unit and Memory Location

MICROPROCESSOR 8085 †¢ Reference Book: – Ramesh S. Goankar, â€Å"Microprocessor Architecture, Programming and Applications with 8085†, 5th Edition, Prentice Hall †¢ Week 1 – Basic Concept and Ideas about Microprocessor. †¢ Week 2 – Architecture of 8085 †¢ Week 3 – Addressing Modes and Instruction set of 8085 †¢ Week 4 – Interrupts of 8085 †¢ Week 5 onwards – Peripherals. Basic Concepts of Microprocessors †¢ Differences between: – Microcomputer – a computer with a microprocessor as its CPU. Includes memory, I/O etc. Microprocessor – silicon chip which includes ALU, register circuits & control circuits – Microcontroller – silicon chip which includes microprocessor, memory & I/O in a single package. What is a Microprocessor? †¢ The word comes from the combination micro and processor. – Processor means a device that processes whatever. In this context proces sor means a device that processes numbers, specifically binary numbers, 0’s and 1’s. †¢ To process means to manipulate. It is a general term that describes all manipulation. Again in this content, it means to perform certain operations on the numbers that depend on the microprocessor’s design.What about micro? †¢ Micro is a new addition. – In the late 1960’s, processors were built using discrete elements. †¢ These devices performed the required operation, but were too large and too slow. – In the early 1970’s the microchip was invented. All of the components that made up the processor were now placed on a single piece of silicon. The size became several thousand times smaller and the speed became several hundred times faster. The â€Å"Micro†Processor was born. Was there ever a â€Å"mini†processor? †¢ No. – It went directly from discrete elements to a single chip. However, omparing todayâ€⠄¢s microprocessors to the ones built in the early 1970’s you find an extreme increase in the amount of integration. †¢ So, What is a microprocessor? Definition of the Microprocessor The microprocessor is a programmable device that takes in numbers, performs on them arithmetic or logical operations according to the program stored in memory and then produces other numbers as a result. Definition (Contd. ) †¢ Lets expand each of the underlined words: – Programmable device: The microprocessor can perform different sets of operations on the data it receives depending on the sequence of instructions supplied in the given program.By changing the program, the microprocessor manipulates the data in different ways. – Instructions: Each microprocessor is designed to execute a specific group of operations. This group of operations is called an instruction set. This instruction set defines what the microprocessor can and cannot do. Definition (Contd. ) – Ta kes in: The data that the microprocessor manipulates must come from somewhere. †¢ It comes from what is called â€Å"input devices†. †¢ These are devices that bring data into the system from the outside world. †¢ These represent devices such as a keyboard, a mouse, switches, and the like.Definition (Contd. ) – Numbers: The microprocessor has a very narrow view on life. It only understands binary numbers. A binary digit is called a bit (which comes from binary digit). The microprocessor recognizes and processes a group of bits together. This group of bits is called a â€Å"word†. The number of bits in a Microprocessor’s word, is a measure of its â€Å"abilities†. Definition (Contd. ) – Words, Bytes, etc. †¢ The earliest microprocessor (the Intel 8088 and Motorola’s 6800) recognized 8-bit words. – They processed information 8-bits at a time. That’s why they are called â€Å"8-bit processors†.They can handle large numbers, but in order to process these numbers, they broke them into 8-bit pieces and processed each group of 8-bits separately. †¢ Later microprocessors (8086 and 68000) were designed with 16-bit words. – A group of 8-bits were referred to as a â€Å"half-word† or â€Å"byte†. – A group of 4 bits is called a â€Å"nibble†. – Also, 32 bit groups were given the name â€Å"long word†. †¢ Today, all processors manipulate at least 32 bits at a time and there exists microprocessors that can process 64, 80, 128 bits Definition (Contd. ) – Arithmetic and Logic Operations: Every microprocessor has arithmetic operations such as add and subtract as part of its instruction set. – Most microprocessors will have operations such as multiply and divide. – Some of the newer ones will have complex operations such as square root. †¢ In addition, microprocessors have logic operations as well. Such as AND, OR, XOR, shift left, shift right, etc. †¢ Again, the number and types of operations define the microprocessor’s instruction set and depends on the specific microprocessor. Definition (Contd. ) – Stored in memory : †¢ First, what is memory? – Memory is the location where information is kept while not in current use. Memory is a collection of storage devices. Usually, each storage device holds one bit. Also, in most kinds of memory, these storage devices are grouped into groups of 8. These 8 storage locations can only be accessed together. So, one can only read or write in terms of bytes to and form memory. – Memory is usually measured by the number of bytes it can hold. It is measured in Kilos, Megas and lately Gigas. A Kilo in computer language is 210 =1024. So, a KB (KiloByte) is 1024 bytes. Mega is 1024 Kilos and Giga is 1024 Mega. Definition (Contd. ) – Stored in memory: †¢ When a program is entered into a computer, it is st ored in memory.Then as the microprocessor starts to execute the instructions, it brings the instructions from memory one at a time. †¢ Memory is also used to hold the data. – The microprocessor reads (brings in) the data from memory when it needs it and writes (stores) the results into memory when it is done. Definition (Contd. ) – Produces: For the user to see the result of the execution of the program, the results must be presented in a human readable form. †¢ The results must be presented on an output device. †¢ This can be the monitor, a paper from the printer, a simple LED or many other forms. A Microprocessor-based systemFrom the above description, we can draw the following block diagram to represent a microprocessor-based system: Input Output Memory Inside The Microprocessor †¢ Internally, the microprocessor is made up of 3 main units. – The Arithmetic/Logic Unit (ALU) – The Control Unit. – An array of registers for holdi ng data while it is being manipulated. Organization of a microprocessorbased system †¢ Let’s expand the picture a bit. I/O Input / Output ALU Register Array System Bus Memory ROM RAM Control Memory †¢ Memory stores information such as instructions and data in binary format (0 and 1).It provides this information to the microprocessor whenever it is needed. †¢ Usually, there is a memory â€Å"sub-system† in a microprocessor-based system. This sub-system includes: – The registers inside the microprocessor – Read Only Memory (ROM) †¢ used to store information that does not change. – Random Access Memory (RAM) (also known as Read/Write Memory). †¢ used to store information supplied by the user. Such as programs and data. Memory Map and Addresses †¢ The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Address Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip 8FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip Memory †¢ To execute a program: – the user enters its instructions in binary format into the memory. – The microprocessor then reads these instructions and whatever data is needed from memory, executes the instructions and places the results either in memory or produces it on an output device. The three cycle instruction execution model To execute a program, the microprocessor â€Å"reads† each instruction from memory, â€Å"interprets† it, then â€Å"executes† it. †¢ To use the right names for the cycles: – The microprocessor fetches each instruction, – decodes it, – Then executes it. †¢ This sequence is continued until all instructions are performed. Machine Language †¢ The number of bits tha t form the â€Å"word† of a microprocessor is fixed for that particular processor. – These bits define a maximum number of combinations. †¢ For example an 8-bit microprocessor can have at most 28 = 256 different combinations. However, in most microprocessors, not all of these combinations are used. – Certain patterns are chosen and assigned specific meanings. – Each of these patterns forms an instruction for the microprocessor. – The complete set of patterns makes up the microprocessor’s machine language. The 8085 Machine Language †¢ The 8085 (from Intel) is an 8-bit microprocessor. – The 8085 uses a total of 246 bit patterns to form its instruction set. – These 246 patterns represent only 74 instructions. †¢ The reason for the difference is that some (actually most) instructions have multiple different formats. Because it is very difficult to enter the bit patterns correctly, they are usually entered in hexadeci mal instead of binary. †¢ For example, the combination 0011 1100 which translates into â€Å"increment the number in the register called the accumulator†, is usually entered as 3C. Assembly Language †¢ Entering the instructions using hexadecimal is quite easier than entering the binary combinations. – However, it still is difficult to understand what a program written in hexadecimal does. – So, each company defines a symbolic code for the instructions. – These codes are called â€Å"mnemonics†. The mnemonic for each instruction is usually a group of letters that suggest the operation performed. Assembly Language †¢ Using the same example from before, – 00111100 translates to 3C in hexadecimal (OPCODE) – Its mnemonic is: â€Å"INR A†. – INR stands for â€Å"increment register† and A is short for accumulator. †¢ Another example is: 1000 0000, – Which translates to 80 in hexadecimal. â€⠀œ Its mnemonic is â€Å"ADD B†. – â€Å"Add register B to the accumulator and keep the result in the accumulator†. Assembly Language †¢ It is important to remember that a machine language and its associated assembly language are completely machine dependent. In other words, they are not transferable from one microprocessor to a different one. †¢ For example, Motorolla has an 8-bit microprocessor called the 6800. – The 8085 machine language is very different from that of the 6800. So is the assembly language. – A program written for the 8085 cannot be executed on the 6800 and vice versa. â€Å"Assembling† The Program †¢ How does assembly language get translated into machine language? – There are two ways: – 1st there is â€Å"hand assembly†. †¢ The programmer translates each assembly language instruction into its equivalent hexadecimal code (machine language).Then the hexadecimal code is entered into memory. – The other possibility is a program called an â€Å"assembler†, which does the translation automatically. 8085 Microprocessor Architecture †¢ †¢ †¢ †¢ †¢ †¢ 8-bit general purpose  µp Capable of addressing 64 k of memory Has 40 pins Requires +5 v power supply Can operate with 3 MHz clock 8085 upward compatible Pins Power Supply: +5 V Frequency Generator is connected to those pins Input/Output/ Memory Read Write Multiplexed Address Data Bus Address latch Enable Address Bus †¢ System Bus – wires connecting memory & I/O to microprocessor – Address Bus Unidirectional †¢ Identifying peripheral or memory location – Data Bus †¢ Bidirectional †¢ Transferring data – Control Bus †¢ Synchronization signals †¢ Timing signals †¢ Control signal Architecture of Intel 8085 Microprocessor Intel 8085 Microprocessor †¢ Microprocessor consists of: – – – – – Control unit: control microprocessor operations. ALU: performs data processing function. Registers: provide storage internal to CPU. Interrupts Internal data bus The ALU †¢ In addition to the arithmetic & logic circuits, the ALU includes the accumulator, which is part of every arithmetic & logic operation. Also, the ALU includes a temporary register used for holding data temporarily during the execution of the operation. This temporary register is not accessible by the programmer. †¢ Registers – General Purpose Registers †¢ B, C, D, E, H & L (8 bit registers) †¢ Can be used singly †¢ Or can be used as 16 bit register pairs – BC, DE, HL †¢ H & L can be used as a data pointer (holds memory address) – Special Purpose Registers †¢ Accumulator (8 bit register) – Store 8 bit data – Store the result of an operation – Store 8 bit data during I/O transfer Accumulator Flags B C D E H L Program Counter Stack Pointer Address 6 8 Data †¢ Flag Register – 8 bit register – shows the status of the microprocessor before/after an operation – S (sign flag), Z (zero flag), AC (auxillary carry flag), P (parity flag) & CY (carry flag) D7 S D6 Z D5 X D4 AC D3 X D2 P D1 X D0 CY – Sign Flag †¢ Used for indicating the sign of the data in the accumulator †¢ The sign flag is set if negative (1 – negative) †¢ The sign flag is reset if positive (0 –positive) †¢ Zero Flag – Is set if result obtained after an operation is 0 – Is set following an increment or decrement operation of that register 10110011 + 01001101 ————–1 00000000 †¢ Carry Flag Is set if there is a carry or borrow from arithmetic operation 1011 0101 + 0110 1100 ————–Carry 1 0010 0001 1011 0101 – 1100 1100 ————–Borrow 1 1110 1001 †¢ Auxillary Carry Flag – Is set if there is a carry out of bit 3 †¢ Parity Flag – Is set if parity is even – Is cleared if parity is odd The Internal Architecture †¢ We have already discussed the general purpose registers, the Accumulator, and the flags. †¢ The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. Since it holds an address, it must be 16 bits wide. The Internal Architecture †¢ The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion. Non Programmable Registers †¢ Instruction Register & Decoder – Inst ruction is stored in IR after fetched by processor – Decoder decodes instruction in IR Internal Clock generator – 3. 125 MHz internally – 6. 5 MHz externally The Address and Data Busses †¢ The address bus has 8 signal lines A8 – A15 which are unidirectional. †¢ The other 8 address bits are multiplexed (time shared) with the 8 data bits. – So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 and D0 – D7 at the same time. †¢ During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. – In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. Demultiplexing AD7-AD0 From the above description, it becomes obvious that the AD7– AD0 lines are serving a dual purpose and that they need to be demultiplexed to get all the information. – The high order bits of the address remain on the bus for three clock periods. However, the low order bits remain for only one clock period and they would be lost if they are not saved externally. Also, notice that the low order bits of the address disappear when they are needed most. – To make sure we have the entire address for the full three clock cycles, we will use an external latch to save the value of AD7– AD0 when it is carrying the address bits.We use the ALE signal to enable this latch. Demultiplexing AD7-AD0 8085 A15-A8 ALE AD7-AD0 Latch A7- A0 D7- D0 – Given that ALE operates as a pulse during T1, we will be able to latch the address. Then when ALE goes low, the address is saved and the AD7– AD0 lines can be used for their purpose as the bi-directional data lines. Demultiplexing the Bus AD7 – AD0 †¢ †¢ †¢ †¢ The high order address is placed on the address bus and hold for 3 clk periods, The low o rder address is lost after the first clk period, this address needs to be hold however we need to use latch The address AD7 – AD0 is connected as inputs to the latch 74LS373.The ALE signal is connected to the enable (G) pin of the latch and the OC – Output control – of the latch is grounded The Overall Picture †¢ Putting all of the concepts together, we get: A15- A10 Chip Selection Circuit 8085 A15-A8 ALE AD7-AD0 Latch CS A9- A0 A7- A0 1K Byte Memory Chip WR RD IO/M D7- D0 RD WR Introduction to 8085 Instructions The 8085 Instructions – Since the 8085 is an 8-bit device it can have up to 28 (256) instructions. †¢ However, the 8085 only uses 246 combinations that represent a total of 74 instructions. – Most of the instructions have more than one format. These instructions can be grouped into five different groups: †¢ †¢ †¢ †¢ †¢ Data Transfer Operations Arithmetic Operations Logic Operations Branch Operations Machin e Control Operations Instruction and Data Formats †¢ Each instruction has two parts. – The first part is the task or operation to be performed. †¢ This part is called the â€Å"opcode† (operation code). – The second part is the data to be operated on †¢ Called the â€Å"operand†. Data Transfer Operations – These operations simply COPY the data from the source to the destination. – MOV, MVI, LDA, and STA – They transfer: †¢ †¢ †¢ †¢ Data between registers.Data Byte to a register or memory location. Data between a memory location and a register. Data between an IO Device and the accumulator. – The data in the source is not changed. The LXI instruction †¢ The 8085 provides an instruction to place the 16-bit data into the register pair in one step. †¢ LXI Rp, (Load eXtended Immediate) – The instruction LXI B 4000H will place the 16-bit number 4000 into the register pair B, C. â₠¬ ¢ The upper two digits are placed in the 1st register of the pair and the lower two digits in the 2nd . B 40 00 C LXI B 40 00H The Memory â€Å"Register† Most of the instructions of the 8085 can use a memory location in place of a register. – The memory location will become the â€Å"memory† register M. †¢ MOV M B – copy the data from register B into a memory location. – Which memory location? †¢ The memory location is identified by the contents of the HL register pair. – The 16-bit contents of the HL register pair are treated as a 16-bit address and used to identify the memory location. Using the Other Register Pairs – There is also an instruction for moving data from memory to the accumulator without disturbing the contents of the H and L register. †¢ LDAX Rp (LoaD Accumulator eXtended) Copy the 8-bit contents of the memory location identified by the Rp register pair into the Accumulator. – This instruction o nly uses the BC or DE pair. – It does not accept the HL pair. Indirect Addressing Mode †¢ Using data in memory directly (without loading first into a Microprocessor’s register) is called Indirect Addressing. †¢ Indirect addressing uses the data in a register pair as a 16-bit address to identify the memory location being accessed. – The HL register pair is always used in conjunction with the memory register â€Å"M†. – The BC and DE register pairs can be used to load data into the Accumultor using indirect addressing.Arithmetic Operations – Addition (ADD, ADI): – Any 8-bit number. – The contents of a register. – The contents of a memory location. †¢ Can be added to the contents of the accumulator and the result is stored in the accumulator. – Subtraction (SUB, SUI): – Any 8-bit number – The contents of a register – The contents of a memory location †¢ Can be subtracted from the contents of the accumulator. The result is stored in the accumulator. Arithmetic Operations Related to Memory †¢ These instructions perform an arithmetic operation using the contents of a memory location while they are still in memory. ADD – SUB – INR M M M / DCR M †¢ Add the contents of M to the Accumulator †¢ Sub the contents of M from the Accumulator †¢ Increment/decrement the contents of the memory location in place. – All of these use the contents of the HL register pair to identify the memory location being used. Arithmetic Operations – Increment (INR) and Decrement (DCR): †¢ The 8-bit contents of any memory location or any register can be directly incremented or decremented by 1. †¢ No need to disturb the contents of the accumulator. Manipulating Addresses †¢ Now that we have a 16-bit address in a register pair, how do we manipulate it? It is possible to manipulate a 16-bit address stored in a register pair as one entity using some special instructions. †¢ INX Rp †¢ DCX Rp (Increment the 16-bit number in the register pair) (Decrement the 16-bit number in the register pair) – The register pair is incremented or decremented as one entity. No need to worry about a carry from the lower 8-bits to the upper. It is taken care of automatically. Logic Operations †¢ These instructions perform logic operations on the contents of the accumulator. – ANA, ANI, ORA, ORI, XRA and XRI †¢ Source: Accumulator and – An 8-bit number – The contents of a register – The contents of a memory location Destination: Accumulator ANA R/M ANI # ORA ORI XRA XRI R/M # R/M # AND Accumulator With Reg/Mem AND Accumulator With an 8-bit number OR Accumulator With Reg/Mem OR Accumulator With an 8-bit number XOR Accumulator With Reg/Mem XOR Accumulator With an 8-bit number Logic Operations – Complement: †¢ 1’s complement of the contents of the accumulato r. CMA No operand Additional Logic Operations †¢ Rotate – Rotate the contents of the accumulator one position to the left or right. – RLC – RAL – RRC – RAR Rotate the accumulator left. Bit 7 goes to bit 0 AND the Carry flag. Rotate the accumulator left through the carry.Bit 7 goes to the carry and carry goes to bit 0. Rotate the accumulator right. Bit 0 goes to bit 7 AND the Carry flag. Rotate the accumulator right through the carry. Bit 0 goes to the carry and carry goes to bit 7. RLC vs. RLA Carry Flag †¢ RLC 7 6 5 4 3 2 1 0 Accumulator Carry Flag †¢ RAL 7 6 5 4 3 2 1 0 Accumulator Logical Operations †¢ Compare †¢ Compare the contents of a register or memory location with the contents of the accumulator. – CMP R/M Compare the contents of the register or memory location to the contents of the accumulator. Compare the 8-bit number to the contents of the accumulator. CPI # †¢ The compare instruction sets the flag s (Z, Cy, and S). †¢ The compare is done using an internal subtraction that does not change the contents of the accumulator. A – (R / M / #) Branch Operations †¢ Two types: – Unconditional branch. †¢ Go to a new location no matter what. – Conditional branch. †¢ Go to a new location if the condition is true. Unconditional Branch – JMP Address †¢ Jump to the address specified (Go to). – CALL Address †¢ Jump to the address specified but treat it as a subroutine. – RET †¢ Return from a subroutine. – The addresses supplied to all branch operations must be 16-bits.Conditional Branch – Go to new location if a specified condition is met. †¢ JZ Address (Jump on Zero) – Go to address specified if the Zero flag is set. †¢ JNZ Address (Jump on NOT Zero) – Go to address specified if the Zero flag is not set. †¢ JC Address (Jump on Carry) – Go to the address specified if the Carry flag is set. †¢ JNC Address (Jump on No Carry) – Go to the address specified if the Carry flag is not set. †¢ JP †¢ JM Address (Jump on Plus) Address (Jump on Minus) – Go to the address specified if the Sign flag is not set – Go to the address specified if the Sign flag is set.Machine Control – HLT †¢ Stop executing the program. – NOP †¢ No operation †¢ Exactly as it says, do nothing. †¢ Usually used for delay or to replace instructions during debugging. Operand Types †¢ There are different ways for specifying the operand: – There may not be an operand (implied operand) †¢ CMA – The operand may be an 8-bit number (immediate data) †¢ ADI 4FH – The operand may be an internal register (register) †¢ SUB B – The operand may be a 16-bit address (memory address) †¢ LDA 4000H Instruction Size †¢ Depending on the operand type, the instruction may have diff erent sizes.It will occupy a different number of memory bytes. – Typically, all instructions occupy one byte only. – The exception is any instruction that contains immediate data or a memory address. †¢ Instructions that include immediate data use two bytes. – One for the opcode and the other for the 8-bit data. †¢ Instructions that include a memory address occupy three bytes. – One for the opcode, and the other two for the 16-bit address. Instruction with Immediate Date †¢ Operation: Load an 8-bit number into the accumulator. – MVI A, 32 †¢ Operation: MVI A †¢ Operand: The number 32 †¢ Binary Code: 0011 1110 3E 1st byte. 011 0010 32 2nd byte. Instruction with a Memory Address †¢ Operation: go to address 2085. – Instruction: JMP 2085 †¢ Opcode: JMP †¢ Operand: 2085 †¢ Binary code: 1100 0011 C3 1000 0101 85 0010 0000 20 1st byte. 2nd byte 3rd byte Addressing Modes †¢ The microprocessor ha s different ways of specifying the data for the instruction. These are called â€Å"addressing modes†. †¢ The 8085 has four addressing modes: – – – – Implied Immediate Direct Indirect CMA MVI B, 45 LDA 4000 LDAX B †¢ Load the accumulator with the contents of the memory location whose address is stored in the register pair BC). Data Formats In an 8-bit microprocessor, data can be represented in one of four formats: †¢ †¢ †¢ †¢ ASCII BCD Signed Integer Unsigned Integer. – It is important to recognize that the microprocessor deals with 0’s and 1’s. †¢ It deals with values as strings of bits. †¢ It is the job of the user to add a meaning to these strings. Data Formats †¢ Assume the accumulator contains the following value: 0100 0001. – There are four ways of reading this value: †¢ It is an unsigned integer expressed in binary, the equivalent decimal number would be 65. †¢ It is a number expressed in BCD (Binary Coded Decimal) format. That would make it, 41. It is an ASCII representation of a letter. That would make it the letter A. †¢ It is a string of 0’s and 1’s where the 0th and the 6th bits are set to 1 while all other bits are set to 0. ASCII stands for American Standard Code for Information Interchange. Counters & Time Delays Counters †¢ A loop counter is set up by loading a register with a certain value †¢ Then using the DCR (to decrement) and INR (to increment) the contents of the register are updated. †¢ A loop is set up with a conditional jump instruction that loops back or not depending on whether the count has reached the termination count.Counters †¢ The operation of a loop counter can be described using the following flowchart. Initialize Body of loop Update the count No Is this Final Count? Yes Sample ALP for implementing a loop Using DCR instruction MVI C, 15H LOOP DCR C JNZ LOOP Using a Regist er Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. †¢ It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP Delays †¢ It was shown in Chapter 2 that each instruction passes through different combinations of Fetch, Memory Read, and Memory Write cycles. †¢ Knowing the combinations of cycles, one can calculate how long such an instruction would require to complete. The table in Appendix F of the book contains a column with the title B/M/T. – B for Number of Bytes – M for Number of Machine Cycles – T for Number of T-State. Delays †¢ Knowing how many T-States an instruction requires, and keeping in mind that a T-State is one clock cycle long, we can calculate the time using the following formula: Delay = No. of T-States / Frequency †¢ For example a â€Å"MVI† instruction uses 7 T-States. Therefore, if the Microprocessor is running at 2 MHz, the instruction would require 3. 5  µSeconds to complete. Delay loops †¢ We can use a loop to produce a certain amount of time delay in a program. The following is an example of a delay loop: MVI C, FFH LOOP DCR C JNZ LOOP 7 T-States 4 T-States 10 T-States †¢ The first instruction initializes the loop counter and is executed only once requiring only 7 T-States. †¢ The following two instructions form a loop that requires 14 T-States to execute and is repeated 255 times until C becomes 0. Del ay Loops (Contd. ) †¢ We need to keep in mind though that in the last iteration of the loop, the JNZ instruction will fail and require only 7 T-States rather than the 10. †¢ Therefore, we must deduct 3 T-States from the total delay to get an accurate delay calculation. To calculate the delay, we use the following formula: Tdelay = TO + TL – Tdelay = total delay – TO = delay outside the loop – TL = delay of the loop †¢ TO is the sum of all delays outside the loop. Delay Loops (Contd. ) †¢ Using these formulas, we can calculate the time delay for the previous example: †¢ TO = 7 T-States – Delay of the MVI instruction †¢ TL = (14 X 255) – 3 = 3567 T-States – 14 T-States for the 2 instructions repeated 255 times (FF16 = 25510) reduced by the 3 T-States for the final JNZ. Using a Register Pair as a Loop Counter †¢ Using a single register, one can repeat a loop for a maximum count of 255 times. It is possible to increase this count by using a register pair for the loop counter instead of the single register. – A minor problem arises in how to test for the final count since DCX and INX do not modify the flags. – However, if the loop is looking for when the count becomes zero, we can use a small trick by ORing the two registers in the pair and then checking the zero flag. Using a Register Pair as a Loop Counter †¢ The following is an example of a delay loop set up with a register pair as the loop counter. LXI B, 1000H LOOP DCX B MOV A, C ORA B JNZ LOOP 10 T-States 6 T-States 4 T-States 4 T-States 10 T-StatesUsing a Register Pair as a Loop Counter †¢ Using the same formula from before, we can calculate: †¢ TO = 10 T-States – The delay for the LXI instruction †¢ TL = (24 X 4096) – 3 = 98301 T- States – 24 T-States for the 4 instructions in the loop repeated 4096 times (100016 = 409610) reduced by the 3 TStates for the JNZ in the last iterat ion. Nested Loops †¢ Nested loops can be easily setup in Assembly language by using two registers for the two loop counters and updating the right register in the right loop. – In the figure, the body of loop2 can be before or after loop1.Initialize loop 2 Body of loop 2 Initialize loop 1 Body of loop 1 Update the count1 No Is this Final Count? Yes Update the count 2 No Is this Final Count? Yes Nested Loops for Delay †¢ Instead (or in conjunction with) Register Pairs, a nested loop structure can be used to increase the total delay produced. MVI B, 10H LOOP2 MVI C, FFH LOOP1 DCR C JNZ LOOP1 DCR B JNZ LOOP2 7 T-States 7 T-States 4 T-States 10 T-States 4 T-States 10 T-States Delay Calculation of Nested Loops †¢ The calculation remains the same except that it the formula must be applied recursively to each loop. Start with the inner loop, then plug that delay in the calculation of the outer loop. †¢ Delay of inner loop – TO1 = 7 T-States †¢ MVI C, FFH instruction – TL1 = (255 X 14) – 3 = 3567 T-States †¢ 14 T-States for the DCR C and JNZ instructions repeated 255 Delay Calculation of Nested Loops †¢ Delay of outer loop – TO2 = 7 T-States †¢ MVI B, 10H instruction – TL1 = (16 X (14 + 3574)) – 3 = 57405 T-States †¢ 14 T-States for the DCR B and JNZ instructions and 3574 T-States for loop1 repeated 16 times (1016 = 1610) minus 3 for the final JNZ. – TDelay = 7 + 57405 = 57412 T-States †¢ Total Delay – TDelay = 57412 X 0. 5  µSec = 28. 06 mSec Increasing the delay †¢ The delay can be further increased by using register pairs for each of the loop counters in the nested loops setup. †¢ It can also be increased by adding dummy instructions (like NOP) in the body of the loop. Timing Diagram Representation of Various Control signals generated during Execution of an Instruction. Following Buses and Control Signals must be shown in a Timing Diagram: â € ¢Higher Order Address Bus. †¢Lower Address/Data bus †¢ALE †¢RD †¢WR †¢IO/M Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78 Timing Diagram Instruction: A000h MOV A,B Corresponding Coding: A000h 78OFC 8085 Memory Timing Diagram Instruction: A000h MOV A,B 00h T1 T2 T3 T4 A0h A15- A8 (Higher Order Address bus) Corresponding Coding: A000h 78 78h ALE RD OFC WR 8085 Memory IO/M Op-code fetch Cycle Timing Diagram Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 Timing Diagram Instruction: A000h MVI A,45h OFC MEMR Corresponding Coding: A000h A001h 3E 45 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h A0h A15- A8 (Higher Order Address bus) 00h 3Eh 01h 45h DA7-DA0 (Lower order address/data Bus) Instruction: A000h MVI A,45h Corresponding Coding: A000h A001h 3E 45 WR RD ALEIO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h LXI A,FO45h Corresponding Coding: A000h A001h A002h 21 45 F0 Timing Dia gram Instruction: A000h LXI A,FO45h OFC MEMR MEMR Corresponding Coding: A000h A001h A002h 21 45 F0 8085 Memory Timing Diagram Op-Code Fetch Cycle Memory Read Cycle Memory Read Cycle T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 A0h A0h A0h A15- A8 (Higher Order Address bus) 00h 21h 01h 45h 02h F0h DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Timing Diagram Instruction: A000h MOV A,M Corresponding Coding: A000h 7E Timing Diagram Instruction: A000h MOV A,MOFC MEMR Corresponding Coding: A000h 7E 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus) Instruction: A000h MOV A,M Corresponding Coding: A000h 7E 00h 7Eh L Reg Content Of M DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Read Cycle Timing Diagram Instruction: A000h MOV M,A Corresponding Coding: A000h 77 Timing Diagram Instruction: A000h MOV M,A OFC MEMW Corresponding Coding: A000h 77 8085 Memory Timing Diagram T1 T2 T3 T4 T5 T6 T7 A0h Content Of Reg H A15- A8 (Higher Order Address bus)Instruction: A000h MOV M,A Corresponding Coding: A000h 77 00h 7Eh L Reg Content of Reg A DA7-DA0 (Lower order address/data Bus) ALE RD WR IO/M Op-Code Fetch Cycle Memory Write Cycle Chapter 9 Stack and Subroutines The Stack †¢ The stack is an area of memory identified by the programmer for temporary storage of information. †¢ The stack is a LIFO structure. – Last In First Out. †¢ The stack normally grows backwards into memory. – In other words, the programmer defines the bottom of the stack and the stack grows up into reducing address range. The Stack grows backwards into memory Memory Bottom of the Stack The Stack Given that the stack grows backwards into memory, it is customary to place the bottom of the stack at the end of memory to keep it as far away from user programs as possible. †¢ In the 8085, the stack is defined by setting the SP (Stack Pointer) register. LXI SP, FFFFH †¢ This sets the Stack Pointer to location FFFFH (end of memory for the 8085). Saving Information on the Stack †¢ Information is saved on the stack by PUSHing it on. – It is retrieved from the stack by POPing it off. †¢ The 8085 provides two instructions: PUSH and POP for storing information on the stack and retrieving it back. – Both PUSH and POP work with register pairs ONLY.The PUSH Instruction †¢ PUSH B – Decrement SP – Copy the contents of register B to the memory location pointed to by SP – Decrement BSP C F3 12 – Copy the contents of register C to the memory location pointed to by SP F3 FFFB FFFC FFFD FFFE FFFF 12 SP The POP Instruction †¢ POP D – Copy the contents of the memory location pointed to by the SP to register E – Increment SP – Copy the contents of the memory location D E F3 12 pointed to by the SP to register D – Increment SP F3 SP FFFB FFFC FFFD FFFE FFFF 12 Operation of the Stack †¢ During pushing, the stack operates in a â€Å"decrement then store† style. The stack pointer is decremented first, then the information is placed on the stack. †¢ During poping, the stack operates in a â€Å"use then increment† style. – The information is retrieved from the top of the the stack and then the pointer is incremented. †¢ The SP pointer always points to â€Å"the top of the stack†. LIFO †¢ The order of PUSHs and POPs must be opposite of each other in order to retrieve information back into its original location. PUSH B PUSH D †¦ POP D POP B The PSW Register Pair †¢ The 8085 recognizes one additional register pair called the PSW (Program Status Word). This register pair is made up of the Accumulator and the Flags registers. †¢ It is possible to push the PSW onto the stack, do whatever operations are needed, then POP it off of the stack. – The result is that the contents of the Accumulator and the status of the Flags are ret urned to what they were before the operations were executed. Subroutines †¢ A subroutine is a group of instructions that will be used repeatedly in different locations of the program. – Rather than repeat the same instructions several times, they can be grouped into a subroutine that is called from the different locations. In Assembly language, a subroutine can exist anywhere in the code. – However, it is customary to place subroutines separately from the main program. Subroutines †¢ The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RTE insutruction is used to return the execution to the calling routine. The CALL Instruction †¢ CALL 4000H – Push the address of the instruction immediately following the CALL onto the stack 2000 CALL 4000 2003 counter – Load the program PC 2 0 0 3with the 16-bit address supplied with the CALL instructi on. FFFB FFFC FFFD FFFE FFFF 3 20 SP The RTE Instruction †¢ RTE – Retrieve the return address from the top of the stack – Load the program counter with the return address. 2003 PC 4014 4015 †¦ RTE FFFB FFFC FFFD FFFE FFFF 03 20 SP Cautions †¢ The CALL instruction places the return address at the two memory locations immediately before where the Stack Pointer is pointing. – You must set the SP correctly BEFORE using the CALL instruction. †¢ The RTE instruction takes the contents of the two memory locations at the top of the stack and uses these as the return address. – Do not modify the stack pointer in a subroutine. You will loose the return address.Passing Data to a Subroutine †¢ In Assembly Language data is passed to a subroutine through registers. – The data is stored in one of the registers by the calling program and the subroutine uses the value from the register. †¢ The other possibility is to use agreed upon mem ory locations. – The calling program stores the data in the memory location and the subroutine retrieves the data from the location and uses it. Call by Reference and Call by Value †¢ If the subroutine performs operations on the contents of the registers, then these modifications will be transferred back to the calling program upon returning from a subroutine. Call by reference †¢ If this is not desired, the subroutine should PUSH all the registers it needs on the stack on entry and POP them on return. – The original values are restored before execution returns to the calling program. Cautions with PUSH and POP †¢ PUSH and POP should be used in opposite order. †¢ There has to be as many POP’s as there are PUSH’s. – If not, the RET statement will pick up the wrong information from the top of the stack and the program will fail. †¢ It is not advisable to place PUSH or POP inside a loop. Conditional CALL and RTE Instructions à ¢â‚¬ ¢ The 8085 supports conditional CALL and conditional RTE instructions. The same conditions used with conditional JUMP instructions can be used. – – – – – CC, call subroutine if Carry flag is set. CNC, call subroutine if Carry flag is not set RC, return from subroutine if Carry flag is set RNC, return from subroutine if Carry flag is not set Etc. A Proper Subroutine †¢ According to Software Engineering practices, a proper subroutine: – Is only entered with a CALL and exited with an RTE – Has a single entry point †¢ Do not use a CALL statement to jump into different points of the same subroutine. – Has a single exit point †¢ There should be one return statement from any subroutine. Following these rules, there should not be any confusion with PUSH and POP usage. The Design and Operation of Memory Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into t wo main types: ? ? Main memory (RAM and ROM) Storage memory (Disks , CD ROMs, etc. ) The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). ? ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information. The number of flip-flops in a â€Å"memory register† determines the size of the memory word. Accessing Information in Memory For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: Select the right memory chip (using part of the address bus). Identify the memory location (using the rest of the address bus). Access the data (using the data bus). 2 Tri-State Buffers An important circuit element that is used extensively in memory. This buffer is a logic circuit that has three states: Logic 0, logic1, and high impedance. When this circuit is in high impedance mode it looks as if it is disconnected from the output completely.The Outp ut is Low The Output is High High Impedance 3 The Tri-State Buffer This circuit has two inputs and one output. The first input behaves like the normal input for the circuit. The second input is an â€Å"enable†. ? ? If it is set high, the output follows the proper circuit behavior. If it is set low, the output looks like a wire connected to nothing. Output Input OR Input Output Enable Enable 4 The Basic Memory Element The basic memory element is similar to a D latch. This latch has an input where the data comes in. It has an enable input and an output on which data comes out. Data Input D Data Output QEnable EN 5 The Basic Memory Element However, this is not safe. Data is always present on the input and the output is always set to the contents of the latch. To avoid this, tri-state buffers are added at the input and output of the latch. Data Input D Data Output Q RD Enable EN WR 6 The Basic Memory Element The WR signal controls the input buffer. The bar over WR means that thi s is an active low signal. So, if WR is 0 the input data reaches the latch input. If WR is 1 the input of the latch looks like a wire connected to nothing. The RD signal controls the output in a similar manner. A Memory â€Å"Register† If we take four of these latches and connect them together, we would have a 4-bit memory register I0 WR I1 I2 I3 D Q EN EN RD D Q EN D Q EN D Q EN O0 O1 O2 O3 8 A group of memory registers D0 o D1 o o D2 o D3 WR D EN Q D EN Q D EN Q D EN Q D Q D EN Q D EN Q D EN Q Expanding on this scheme to add more memory registers we get the diagram to the right. EN D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q o o o o RD D0 D1 D2 9 D3 Externally Initiated Operations External devices can initiate (start) one of the 4 following operations: Reset ?All operations are stopped and the program counter is reset to 0000. The microprocessor’s operations are interrupted and the microprocessor executes what is called a â€Å"service routine†. Th is routine â€Å"handles† the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues. Interrupt ? ? 10 A group of Memory Registers If we represent each memory location (Register) as a block we get the following I0 I1 I2 I3 WR EN0 EN1 EN2 EN3 RD O0 Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers O1 O2 O3 11The Design of a Memory Chip Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location]. 12 The Enable Inputs How do we produce these enable line? Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of line s coming into the chip.These encoded lines are the address lines for memory. 13 The Design of a Memory Chip So, the previous diagram would now look like the following: I I I I 0 1 2 3 WR A d d r e s s D e c o d e r Input Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 Output Buffers A1 A0 RD O0 O1 O2 O3 14 The Design of a Memory Chip Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. Input Buffers WR A1 A0 A D The chip Memory Reg. now look likeDthis: would 0 d e 0 D0 A1 A0 D1 D2 D3 d r e s s c o d e r Memory Reg. 1 Memory Reg. 2 Memory Reg. Output Buffers D1 D2 D3 RD RD WR 15 The steps of writing into Memory What happens when the programmer issues the STA instruction? The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. The da ta is then applied on the data lines and it is stored into the enabled register. 16 Dimensions of Memory Memory is usually measured by two numbers: its length and its width (Length X Width). ? ? The length is the total number of locations.The width is the number of bits in each location. The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) 210 = 1024 locations (1K) ? So, a memory chip with 10 address lines would have Looking at it from the other side, a memory chip with 4K locations would need ? Log2 4096=12 address lines 17 The 8085 and Memory The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. ow would we use these address lines to control the multiple chips? 18 Chip Select Usually, each memory chip has a CS (Chip Select) input. The chip wil l only work if an active signal is applied on that input. To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of â€Å"chip selection†. These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used. 19 Chip Selection Example Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier.We will need to use 2 inputs and a decoder to identify which chip will be used at what time. The resulting design would now look like the one on the following slide. 20 Chip Selection Example RD WR D0 D1 RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS A0 A1 A2 A3 2 X4 Decoder 21 Memory Map and Addresses The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 0000 EPROM 3FFF 4400 Address Range of EPROM Chip Address Range RAM 1 RAM 2 RAM 3 Ad dress Range of 1st RAM Chip 5FFF 6000 Address Range of 2nd RAM Chip FFF 9000 A3FF A400 Address Range of 3rd RAM Chip RAM 4 F7FF FFFF Address Range of 4th RAM Chip 22 Address Range of a Memory Chip The address range of a particular chip is the list of all addresses that are mapped to the chip. An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. †¢ Each box has its unique number that is assigned sequentially. (memory locations) †¢ The boxes are grouped into groups. (memory chips) †¢ The first box in a group has the number immediately after the last box in the previous group. 23 Address Range of a Memory ChipThe above example can be modified slightly to make it closer to our discussion on memory. †¢ Let’s say that this post office has only 1000 boxes. †¢ Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 01 99 are in group 1 and so on. We can look at the box number as if it is made up of two pieces: †¢ The group number and the box’s index within the group. †¢ So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group. 24The 8085 and Address Ranges The 8085 has 16 address lines. So, it can address a total of 64K memory locations. If we use memory chips with 1K locations each, then we will need 64 such chips. The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log21024 = 10) That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log264 = 6). 25 The 8085 and Address Ranges Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 Chip Selection Location Selection within the ChipDepending on the combination on the address lines A15 – A10 , the address range of the specified chip is determined. 26 Chip Select Example A chip that uses the combination A15 – A10 = 001000 would have addresses that range from 2000H to 23FFH. Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. The memory chip in this example would require the following circuit on its chip select input: A 10 A 11 A 12 A 13 A 14 A 15 CS 27 Chip Select Example If we change the above combination to the following: A 10 A 11 A 12 A 13 A 14 A 15 CSNow the chip would have addresses ranging from: 2400 to 27FF. Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. 28 Chip Select Example To illustrate this with a picture: ? ? in the first case, the memory chip occupies the piece of the memory map identified as before. In the second case, it occupies the piece identified as after. Before Af ter 0000 2000 23FF 2400 27FF 0000 FFFF FFFF 29 High-Order vs. Low-Order Address Lines The address lines from a microprocessor can be classified into two types: High-Order ? Low-Order ?

Thursday, August 29, 2019

A Critique of Lost Names, a Book by Richard E. Kim

A Critique of Lost Names, a Book by Richard E. Kim Love Conquers Hate In the book Lost [1] Names by Richard E. Kim, the Koreans ingenuity from experience bolsters Edward Siedensticker’s opinion that Lost Names is not a poem of hate, but a poem of love. The Koreans in Lost Names do not fight the Japanese’s hatred with hatred back to the Japanese. The Korean people understood that fighting the Japanese’s violence and hatred would result in death and damage for both sides, and keep adding to their suffering. When the Koreans realize the consequences of fighting with hate, they wisely choose to fight the Japanese with love. A wise man would know not to fight violence with violence. Back when Koreans and Japanese had a rough relationship; the Japanese kept the Korean people hostage, increased famine for the Koreans, and forbid the from practicing their culture. Temporarily, the Koreans people wanted to take revenge on the Japanese for causing great suffering for the people. The Koreans realized that in the long run, making the Japanese suffer would be useless and a waste of time. The narrator and his father came to the conclusion that making peace with the Japanese and forgetting all their past mishaps would be beneficial for the Korean and the Japanese people. The following passage supports my reasoning: â€Å"Please help us! Please help us!†, he is saying. [] â€Å"Get up†, the narrator says to the man and his wife, â€Å"My father would have saved you† (159). The narrator may not have been willing to let the man and his wife in if he just thought about it for a few seconds. He t ook his time to really think about what the right thing to do was. Being nicer to the Japanese may not benefit the narrator and his people now, but as times change the narrator and his father know that peace would be the best for their people. As the narrator knows how it would feel to be treated unfairly from the Japanese, like when the narrator had his culture taken away from him and being beaten constantly from the Japanese; all because the Koreans are seen as inferior through the Japanese’s eyes. The narrator’s occurrences make him realize why his father is kind to the Japanese when the Japanese are cruel to the Koreans. The narrator’s realization implies that he is learning to fight with love not hate in the passage. Secondarily, the Koreans changed their views of the Japanese because they knew how it felt to be treated immorally. The following quote from Lost Names supports my assertion, â€Å"A youngman with a shotgun is running into the house from the west gate shouting, A man from the police is coming sir! My father says, Bring him in. [] We will turn them over to you, provided the issue of your receipt, we accept your terms, says the narrator’s father† (188). The passage rehashes the idea that the Korean people are learning from the wise ways of the narrator’s father. The narrator’s father does not go up to the shameful Japanese and beat them up for all the things they have done to the Korean people, instead he politely asks for a receipt and makes a compromise. The Koreans want to ruin the Japanese, but they learn that making peace would be the better option from the narrator’s father. His father sets a good example to the Koreans and the Japanese with h is respectful actions. The narrator learns from the father how to fight hate with love, and they teach the other Koreans. The Koreans shrewdness makes Lost Names a poem of love. As the evidence displays above, the poem of love is dominant over the poem of hate in Lost Names. Although there are examples of violence and hatred from the Japanese, the Koreans wisely don’t act for revenge, which diminishes the idea that Lost Names could be a poem of hatred alludes to that Lost Names is a poem of love. The end of Lost Names foreshadows that the Japanese and the Koreans have made peace with each other.The theme from the Lost Names teaches a good lesson; fight hate with love, and make peace.

Wednesday, August 28, 2019

Analysis of Unit Assessment Term Paper Example | Topics and Well Written Essays - 3750 words

Analysis of Unit Assessment - Term Paper Example This is to be done by comparing and ordering numbers, use of vocabulary, matching of standard forms of words, recognizing greater or lesser numbers, rounding off numbers, and drawing graphs. This assessment was conducted by having students complete a test that measured the qualities mentioned above. From an item analysis of the questions and answers, 10 questions were selected that tested all the items. The numbers of correct answers per student and per question are presented and an analysis of the answers is presented. The validity of the results is determined by calculating the Range, Rank, Mean, Median, Mode, Variance, and Standard Deviation of the test. This analysis should be used to determine the level of knowledge of each student and the level of difficulty of each question. After an analysis of the test results, a conclusion can then be made whether each test item should be retained, improved or removed from the unit syllabus. This analysis is presented at the end of this ass essment. The Questions for Analysis Directions: Read each instruction carefully and give the correct answer. Numeration and Place Value Chapter Test Multiple Choice 1) Use the graph below. Circle the letter to show the best answer. How many dolphins and whales are in the aquarium? (A) 1 (C) 5 (B) 4(D) 6 Round to the nearest ten. Circle the letter to show the best answer. 2) 37 3) 75 4) 23 (A) 13 (A) 14 (A) 13 (B) 30 (B) 70 (B) 20 (C) 35 (C) 74 (C) 25 (D) 40(D) 80 (D) 30 Round to the nearest hundred. Circle the letter to show the best answer. 5) 440 6) 214 7) 304 (A) 400(A) 200 (A) 290 (B) 404 (B) 210 (B) 300 (C) 445 (C) 215 (C) 305 (D) 500 (D) 300 (D) 310 8) 504 (A) 500 (B) 505 (C) 510 (D) 600 9) Use the graph below. Circle the letter to show the best answer. How many seals and penguins are in the aquarium? (A) 1 (B) 3 (C) 8 (D) 9 10) Choose which of the following is correct. . (A) 85____>____106 (B) 64________46 Data Calculation and Analysis The test shown above was presented to 20 students, and the answers for each question per student are presented in the following table. Each correct answer by astudent is indicated by "1" and each incorrect answer is indicated by "0". The total number ofcorrect responses by each student is listed in the Total row. The numbers of correct responses per question are in the (+)column and the numbers of incorrect responses per question are in the (-)column. Table 1:Data from Test Assignment S1 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S12 S13 S14 S15 S16 S17 S18 S19 S20 + - Q1 1 1 1 0 1 1 1 1 0 0 0 1 1 0 0 1 0 1 0 1 12 8 Q2 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0 0 0 1 0 4 16 Q3 1 1 0 0 1 0 1 0 0 0 0 1 0 1 0 1 0 1 0 0 8 12 Q4 1 0 0 0 0 0 1 0 1 0 1 0 0 1 1 1 1 1 0 1 10 10 Q5 0 1 1 1 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 10 10 Q6 0 0 1 0 1 0 0 0 1 0 0 1 0 0 0 1 0 1 0 0 6 14 Q7 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 1 0 0 5 15 Q8 1 1 1 0 0 1 0 1 0 1 0 0 0 1 0 0 1 0 0 1 9 11 Q9 1 1 1 0 1 0 0 1 1 0 1 0 0 0 1 0 0 1 1 0 10 10 Q10 0 1 0 1 1 0 1 0 0 1 0 0 1 0 0 0 1 0 0 1 8 12 Total 5 6 5 4 5 3 5 5 3 3 4 3 4 3 3 4 4 6 3 4 82 118 Data analysis can be done using a number of descriptive measures, and the most common of these measures are the mean, mode, median, quartiles, range, and standard deviation. The calculation of the standard deviation will help in the determination of the level of difficulty of each question,

Tuesday, August 27, 2019

Amazons Business Model and the Operational Strategies Coursework - 1

Amazons Business Model and the Operational Strategies - Coursework Example Amazon has been able to pull of its business model through the use of three operational strategies to enhance its competitive advantage: low-cost leadership and customer differentiation. However, when we evaluate Amazon’s business model and the operational strategies that underlie it they greatly resemble those of its key competitor Barnes & Noble. Barnes & Noble also used its economies of scale to support low-cost leadership, it broke new ground by developing software that would enable its customers to personalize their web pages and also enjoy the results of collaborative filtering (Ghemawat 13). The difference in one organization’s choice to use a pure play system while the other uses a brick-and-click system is too simplistic to explain the relative success of Amazon.com over Barnes & Noble. This would be best explained through the dynamic capability. Dynamic capability refers to the ability of the firm to purposefully create, extend or modify its resource base so as to achieve congruence with the changing business environment (Menon and Mohanty 3). Of importance to note is the use of the word â€Å"purposefully† which negates the element of accident or luck. Dynamic capability involves intent and the emergent stream of activities within an organization that is taken with a certain implicit aim. Although dynamic capabilities are equifinal and exhibit commonalities across firms, performance differences arise between firms due to both cost and differential timing with which the dynamic capabilities are used (Menon and Mohanty 5). They are path dependent processes thus are idiosyncratic and difficult to imitate. Dynamic capabilities can be a source of competitive advantage. That is why even though Barnes & Noble seem to be following similar operational strategies to Amazon.com, the results are different for each firm.

Monday, August 26, 2019

Quantitative Techniques for Business Case Study Example | Topics and Well Written Essays - 750 words

Quantitative Techniques for Business - Case Study Example The probability is less than the normal distribution and it is wider at the mean. 4. Under the assumption that the returns of each asset are drawn from an independently and identically distributed normal distribution, are the expected returns statistically different from zero for each asset? State clearly the null and alternative hypothesis in each case. 5. Assume the returns from each asset are independent from each other, are the mean returns statistically different from each other? 6. Calculate the correlation matrix of the returns. 7. Is the assumption of independence realistic? If not, re-test the hypotheses in Question 5 using appropriate test statistics. Compare the results to the results obtained in Question 5. 8. If you can only choose maximum of two assets into a portfolio, which will you choose? What are the optimal weights and the optimal expected returns? State clearly your objective function and provide step-by-step derivations.I would choose AUD per YEN and AUD per UKP since they have higher total returns than the rest. The objective function is to take the portfolio with the highest positive return, as it will maximize profit. 9. Bonus question: Why is it not realistic to assume these rates follow a normal distribution? Moreover, is Treasury bill safer than the other three exchange rates? The rates do not follow a normal distribution since they are not independent of each other. Treasury bill is safer than the other exchange rates since it has a positive return to itself and no negative returns from, the others.

Sunday, August 25, 2019

SCENARIO BASED PROJECT REPORT Essay Example | Topics and Well Written Essays - 2500 words

SCENARIO BASED PROJECT REPORT - Essay Example (ISO 9001) XYZ is one of the leading professional education management system in UK that offer management courses to the executives. Many of its courses are intended for regular day stream members. And the organization has proved its quality and capability through its growing number of professionals coming out of the college on each year. The growing demand for professional skills in every employment, many jobholders are looking to enhance their skills by way of taking up the relevant management courses on part time basis, while continuing their jobs. The quality of the courses offered through the organization has become so popular to get a demand from the remote students to get the online courses. This made the management of the XYZ organization to think about the risks in opening about the online courses, as the management is so particular about he quality and in no way they re willing to loose their reputation. The management wants to adopt a risk less change management where the quality of the services to enhance the value for the entire chain operations. Hence the XYZ education System has identified the ABC business consultancy to do business analysis before venturing into new online system, particularly with risk elimination & continuous quality process. And ABC consultancy has started its Process analysis by adopting the KRAJEWSKI model: Accor According to Total Quality Engineering (1997), strategy deployment means the management and control of the company's direction focus. It helps develop the business policy and plan, providing the focus for carrying the strategy forward into the management of the individual function and section. A process involves the use of an organization's resources to provide something of value, (KRAJEWSKI, p121). The application of a system of processes within an organization, together with the identification and interactions of these processes and their management, can be referred to as the "Process approach". The optimum utilization of these resources in the process results in the efficiency of the process or the quality of the process. . ABC Consultancy has adopted a process analysis approach of XYZ organization and identified several factors that has impact on operations of the education management of XYZ like- Operation levels; global competition; rapid technological changes, ethical, workforce diversity, and environmental issues. In this section, we look at these trends and their challenges for operations managers. (KRAJEWSKI, p12). The consultancy took the concern of operations managers like COO, Operations Executive managers and Branch operations managers etc., Many different choices are made in a selecting human resources, equipment, outsourced services, materials, work flows, and methods that transform inputs

Relatively low number of women in parliaments Essay

Relatively low number of women in parliaments - Essay Example India is the second most heavily populated country in the world and more over the largest democratic country in the world. However, even after 60 years of independence, Indian parliament failed to give the proper representation to the women community in India. India was ruled by only once by a women prime minister: Mrs. Indira Gandhi. The current Indian president and parliament speaker are females. Even then the representation of women in Indian parliament is negligible at present. The cases are not different even in some of the highly developed democratic countries like UK and USA. In UK, only 18% of the total parliamentary seats hold by the women. There are many social, cultural and political reasons for the underrepresentation of women in the parliament. â€Å"The arguments in favour of increasing women’s participation in politics rely on 3 principles: Firstly, on democratic justice, secondly, on resource utilisation and thirdly, on interest representation† (Aggio, 2 001, p.3). Neither the God, nor the nature never ever asked the human to treat the women community in a different manner. In fact the dominant male community using their superior muscle power suppressed the weaker female community needs. It is impossible to the current word to develop properly if we neglect the contributions of the half of our population; the women community. ... Reasons for the underrepresentation of the women in parliament The reasons for the underrepresentation of women in politics can be understood in the case of totalitarian or autocratic countries like China, Saudi Arabia, Myanmar, North Korea or Cuba. However, it is difficult to believe that even in democratic countries, the representation of women in the political decision making bodies or parliament are negligible. â€Å"Democracy cannot afford to be gender blind† (Fogg, 2006, p.24). Democracy ensures equal opportunities to all in principles; however these principles often stay on papers alone. India, one of the largest democracies in world, recently tried to ensure at least 33% of women representation in Parliament. An ordinance was presented in the parliament in order to ensure at least 33% women participation in parliament; however, the stiff resistance from some of the prominent political parties and fundamentalists prevented the Indian parliament form passing such an ordi nance. From the above descriptions, it is clear that one of the major reasons for underrepresentation of women in parliament is the male domination in the society. Even though, in principles, most of us agree the ideas of giving equality to the women; however, when it comes to practice, most of the male community object it. By nature, the male community has a dominant attitude towards the female community. For men, the responsibilities of the females are limited to the boundaries within walls of the home. The above belief has changed slightly in recent times and many of the females started to work in offices and other professional organizations just like men. Many feminists’ movements contributed heavily to bring the women out of the walls of the home. Even then, male

Saturday, August 24, 2019

U.S. foreign policy Essay Example | Topics and Well Written Essays - 6000 words

U.S. foreign policy - Essay Example The United States foreign policies have always been considered controversial – whether they are viewed as an American or as a foreigner. These policies have primarily been based on American and democratic interests being pursued beyond American shores.This expansion was also meant to empower its competition with the United Kingdom and the Soviet Union, countries which were, at that time, considered to be more influential and more financially stable nations than the US.These policies were first laid out in the post World War II period as the country was starting to expand and flex its powers beyond its shores. The Second World War actually served as an equalizer for the US because much of Europe was in ruins as a result of years of fighting Germany. The US was able to gain strength and power politically and economically after WWII and it was also starting to voice its opinions and positions on the different international issues impacting on the global community. To some extent, in the 1950s and 1960s, the US was able to gain much progress in this regard. However, its actions in Korea, Vietnam, and in the Middle East were soon viewed with much cynicism and contempt by the countries affected and by other international watchers and international groups. In short, its actions were viewed as imperialistic and enterprising. For which reason protests and expressions of contempt and dislike for American policies were seen in different countries around the globe. However, it was also viewed with favor by other countries for its commitment to democracy and to freedom. Nevertheless, a closer scrutiny of the US policies in relation to different countries and regions of the world have prompted the surfacing of issues which have impacted much on the economy and the politics of these countries. In the Middle East for example, US interests in its oil products are considered a major consideration for American presence in the region. In turn, their presence has created muc h conflict among the people who see the US as nothing more than an enterprising nation. They object to the presence of American troops in the region, ostensibly sent to maintain peace and order, but to the locals, form part of America’s engine and plan for control over trade and political mandates and activities. In Asia, its presence in the region has been met with mixed reactions. Some countries consider it a â€Å"savior† a â€Å"hero† who has rescued them from Japanese rule. However, in some isolated groups in these very same countries, they are also considered to be opportunists who are seeking to use their natural resources for their economic ends. They are seen as a country which seeks to lessen tariff rates for their personal benefit and for the detriment of these Asian economies. In effect, the US policies are not welcomed with open arms, nor are they completely shunned – for even with these negative mutterings, these countries still know that th e US is the most powerful country in the world. With these scenarios, it is easy to see that the US foreign policies are filled with various angles for discussion which make for enriching knowledge in the field of economy and politics. These policies express the dominance of America in almost all international endeavors, including such endeavors in ensuring worldwide peace and freedom for all. Even as other nations do not share in its goals, the US seems to persist in its goals through its troop presence in the Middle East and in other countries which manifest with civil and political unrest. This paper shall now seek to discuss the US foreign policies in relation to the major events in the past years including the September 11 attacks, the Gulf Wars, and its War against Terror. These are subject matters which have borne much impact to the current status of US politics. This study is being conducted in order to establish a more academic understanding of the issues in relation to the US foreign policies. The Attacks of 9/11 Background The September 11 at

Friday, August 23, 2019

Annotated bibliography on cognition for deaf Example | Topics and Well Written Essays - 250 words

On cognition for deaf - Annotated Bibliography Example The research design was based on the intervention program which incorporated language measures, measures of non-verbal intelligence and vocabulary skills of the sample. The researcher has utilized standard measurement and assessment protocols for each examination. SD (Standard Deviation), PTA (Pure Tone Average), DEIP (Diagnostic Early Intervention Program), TC (Total Communication), FM (Frequency Modulate), PPVT (Peabody Picture Vocabulary Test), EOWPVT (Expressive One-Word Picture Vocabulary Test), SE (Standard Error) and PLAI (Preschool Language Assessment Instrument). The researcher of this study has acquired the previous experience through literature that appropriate interventions can help deaf or hard of hearing individuals to achieve language abilities similar to a hearing and normal individual. Several empirical researches have influenced the researcher to utilize and assess the outcomes of language intervention on deaf children’s linguistic capabilities. The researcher of this study has examined every deaf and hard of hearing child using standard protocols of EOWPVT and PLAI after the completion of DEIP. Every test was conducted in a separate setting and time on the whole sample. The study explored that the impact of DEIP is significantly better in those children who were enrolled in a younger age than those who were enrolled later. The negative correlation of enrolment age and language outcomes was found at the age of 5 years in the whole sample. The degree of hearing loss did not have a significant impact in the measurements and

Thursday, August 22, 2019

Animal Abuse Essay Example for Free

Animal Abuse Essay The Greyhound is an ancient breed of dog. It is the only dog mentioned in the Bible, and has been depicted in many ancient Egyptian paintings, dating back over 4,000 years. Greyhounds were so revered, that the Greyhounds were allowed to share their tents. In ancient Arabic countries, the birth of a son was the most important event, the second was the birth of a Greyhound. The history of dog racing can be traced back to Queen Elizabeth I in the 16th century when Greyhounds were brought over to England from Egypt, where her majesty created the first formal rules of dog coursing, naming it the â€Å"Sport of Queens†. In the 18th century, England exported the sport to America, and soon the sport was comprised of racing and gambling. In 1912, the dog racing as it is known today, was established by Owen Patrick Smith, the man who invented the mechanical lure used in today’s dog racing. The first official dog track was opened in 1919 in California, and in 1931, wagering was legalized in Florida, paving the way for the development of the Palm Beach Kennel Club. The Palm Beach Kennel Club operated permits for dog racing, which officially started in America in 1932. Unfortunately, the once grandeur and majesty of the sport is tarnished with the unethical abuse these animals endure. The definition of animal abuse is â€Å"the crime of inflicting physical pain, suffering or death on an animal, usually a tame one, beyond necessity for normal discipline. It can include neglect that is so monstrous (withholding food and water) that the animal has suffered, died or been put in imminent danger of death. † (Hill, 2005). Many Greyhounds are the subject of abuse in the racing world. The Greyhounds are subject to horrible conditions. Many people enjoy watching a good race. The anticipation of the race and the thrill of their prized dog winning would make anyone want to attend a race. But it’s what happens before and after the race that has many people up in arms over the whole dog racing scene. When the dogs are not racing, they are kept in crates stacked one on top of the other. The dogs are not exercised regularly; the only exercise they get is from racing, and a race lasts for only a few minutes. If an Greyhound is injured during practice or during the race, the dog is killed and ground up for food for the other dogs. Many Greyhounds also die during the race due to exhaustion and dehydration. It is important to address this issue because animal abuse is a crime, and most people who commit these heinous acts are never brought to justice. It is also important to understand why someone could harm an innocent animal. According to the ASPCA, there are three main reasons why someone would be cruel to animals in their article titled, Why people abuse animals. The first reason is that some people abuse animals is that they do not know they are abusing the animal. Some people just don’t think about what they are doing to the animal, and others think excessive force is necessary to maintain control of the animal. A person who hits their dog when he or she does something wrong, like poop in the house, will use excessive force to show the animal that what he or she did was bad. Other people forget to roll down a window on a hot day with the animal in the car. The second reason a person would abuse animals is that the person will do it purposefully, but not for a continuous amount of time. Young kids who throw rocks at cats or kick a dog are an example of this type of abuser. Many young children can be taught through support groups and educational programs to show how an animal feels when it is abused in such a way, and many children learn to respect animals. The third reason a person would abuse an animal is the most serious form of animal cruelty. The third reason a person would abuse an animal is for power. Many of these types of people enjoy hurting the weak and helpless animals, as it makes them feel in control. Most of these people who intentionally hurt an animal have serious psychological issues that need to be addressed. If left unchecked, these issues may lead to more serious acts of violence. According the article, most people that were mentioned in the first and second reason for animal abuse can be educated through materials, counselors and educational classes. But even with the educational classes, what most people don’t understand is the psychological effects of the abuse has on animals. All animals want is to be loved and cared for, especially dogs. Humans have breed dogs to be our companions, and are the only animal that sets out to please us. When a human abuses an animal, we lose that trust that the animal places in us. The main psychological effect abuse has on dogs can be devastating. A dog may feel threatened by any human that it comes in contact with, and the dog can turn aggressive out of fear. Other dogs are fearful and maintain their fearfulness throughout the rest of their lives. These dogs may cower away from humans, shunning away when a human has an object in their hand or hide when they hear raised voices. L. Kalef wrote an article titled Psychological effects of animal cruelty, and in the article, he talked about the effects of animal abuse in Eastern Europe. For those who have traveled to Eastern European countries, it is not uncommon to be privy to packs of dogs roaming in some of the major cities, and sometimes being aggressive out of fear, hunger or abuse have led to provoke a similar reaction by the population by way of harm and abuse. Sadly, these neglected animals are under constant scrutiny and possible attack, which has become all too common. For years, welfare activists have been speaking up for the plight of the strays and the brutal inhumane abuse and killings; but no one until now has suggested that the constant exposure of this violence may instigate other and further violent activity within the community. In other words, growing up in a society being exposed to animal abuse causes further abuse and lack of compassion. (Kalef, 2012) But there are many people who argue that dog racing is not the only animal sport that has animal abuse and that it is part of the sport. Throughout the world of animal sports, there are some instances of animal abuse. In Mexico, bullfighting is a very popular sport, where the object of the game is to kill the bull or else the Matador will be stampeded or stabbed by the bulls horns. The bulls are starved and tortured, and they meaner the bull becomes, the more entertaining the sport. Also, horse racing has had its fair share of animal abuse cases. Many Thoroughbreds that receive an injury are killed, just like the Greyhounds, and made into meat that is sold for human consumption. J. Frater wrote an article titled 10 Debated acts of animal cruelty, which outlines a few instances that can be considered animal abuse. For those who have traveled to Eastern European countries, it is not uncommon to be privy to packs of dogs roaming in some of the major cities, and sometimes being aggressive out of fear, hunger or abuse have led to provoke a similar reaction by the population by way of harm and abuse. Sadly, these neglected animals are under constant scrutiny and possible attack, which has become all too common. For years, welfare activists have been speaking up for the plight of the strays and the brutal inhumane abuse and killings; but no one until now has suggested that the constant exposure of this violence may instigate other and further violent activity within the community. In other words, growing up in a society being exposed to animal abuse causes further abuse and lack of compassion. (Frater, 2010). But to most people, that is just the way the sport is. What is someone going to do with a prized race horse that has a broken leg and can no longer race? Why take the money to fix the injury, when the owner can make money off of selling the animal for food? It’s just part of the sport. But there is one question that needs to be answered. Which side is right? The truth is both sides are right. There will always be animal abuse in sports, as well as throughout the world. We as a people will not be able to completely stop the abuse, we can just diminish the amount of animals are abused. Through the use of stricter laws and more regulations, we as humans can help the voiceless. In conclusion, though there is no one way to solve animal cruelty in the world. There will always be animal cruelty in the sporting world, but as long as we humans can educate the younger generations, the amount of cases of animal cruelty will drastically decrease. Only one can hope that the â€Å"Sport of Queens† can return once again to the grandeur and majesty that the sport once was.

Wednesday, August 21, 2019

Marketing Concepts at the Starbucks Company

Marketing Concepts at the Starbucks Company EXECUTIVE SUMMARY It has been argued by some people that they think marketing contributes to evils appearing in the world caused by the criticism referring to the effects caused by advertising. None of the critics are true because marketing is about finding the best strategy for gathering information about how consumers behave in the market providing those products that could satisfy their needs and wants when they are needed at that particular time such goods should be of good quality. This report will give a clear understanding of what marketing is all about its elements, benefits and costs of a marketing approach in todays business. The Micro and Macro environment concept the factors that influence marketing decisions. Segmentation criteria used for product in different markets. Factors influencing the choice of targeting strategy and the concept of buyer behaviour affecting marketing activities. How product development helps to sustain competitive advantage also process of how distribution can be arranged to provide customer convenience. DEFINITION OF MARKETING Introduction Researchers such as Chartered Institute of marketing came out with the conclusion that marketing in United Kingdom has changed rapidly in the last 30 years which is due to the advanced technology. Customers are the centre heart of the marketing, where by marketing is not only about selling the products, organisations need to have a clear picture of marketing concept and the importance of it in meeting the organisation objectives. Different authors came out with their own definitions of marketing as follows; Marketing is a human activity directed at satisfying human wants and needs Phillip Kotler, He finalise that marketing involve the process of selling and buying the products or services which is conducted in a professional way such as through advertising, promotions, social networks etc that aims at meeting the customers satisfaction.  [1]   The American Marketing of Association came out also with the definition of marketing saying that is an activity which set institutions that is processed to create a message that could be delivered to the customers also exchanging offerings that have value for customers, clients, partners, and society at large. The American Marketing of Association  [2]  . They have viewed that marketing is about going beyond what organisation does encompassing the great extent of activities that marketers undertake making sure their message is about certain product or services reach the customers that is marketing. P. Kotler and G Armstrong defined marketing as the process were by companies tend to create products of value for customers and building strong customer relationships in order to capture the value from customers in return  [3]  . Principles of marketing page 3. Authors came out with this definition due to that fact that marketing is not only involving on selling and buying it includes social and managerial process too where individuals and organisation as well can obtain their needs and wants through the process of exchanging value with others. American Marketing Association 1985 came out again with another definition of marketing which they said that is a process of planning by executing the process of pricing, planning and distribution of ideas that goods and services could create exchange that satisfy individual and organisational objectives. They explained that marketing is a process which is performed within the organisation  [4]  . Marketing strategy and competitive positioning pg 7 CHARACTERISTICS OF A MARKETING ORIENTED ORGANISATION Kohli and Jaworski (1990) defined marketing orientation as one or more departments engaging in activities directed towards the process of developing an understanding of customers such as their buying behaviour which is current and future needs and the factors affecting them, sharing of this understanding across departments and the various departments engaging in activities designed to meet select customer needs.  [5]  Marketing strategy and competitive positioning pg 8 It is argued that social and economic justification of customer wants and needs while at the same time meeting organisational objectives which is based on understanding that a sale does not depend on aggressive sales force, but rather on a customer decision to purchase a product  [6]  Introduction to Marketing 9th Edition pg 8. Characteristics of a marketing oriented organisation are as follows. Concentrates on the products that meets the customer needs and wants which are different from their competitors. Integrating the activities conducted within the organisation such as production to satisfy such wants. Making sure long-term goals are being achieved within the organisation by satisfying customer wants and needs legally and in a response way. A market oriented organisation need to identify their competitive arena and competitors which by knowing their strength and weakness which is assessing what the competitors are intending to do in the future or tomorrow and what they are doing today that could help the organisation to come out with better strategy to win the market share. MARKETING CONCEPT Felton (1959) defined marketing concept as a corporate state of mind that exists on the integration and co-ordination of all the marketing functions which, in turn, are melded with all other corporate functions, for the basic objective of producing long-range profits. It is characterised by achieving organisational goals which depends on identifying he needs and wants of the target markets and making sure desired satisfaction of the customer are delivered in an effective and efficient way than what competitors do. Kotler ELEMENTS OF MARKETING CONCEPT IN STARBUCKS COMPANY Starbucks is a leading retail company selling different flavours of coffee, snacks, to its customers. It started in US in 1971 then opened more branches in across all over UK high streets having 650 stores in UK and Ireland in 1998. Starbucks is targeting all kind of group such as young age, middle age also old age. Starbucks as one of the example showing how they have described the elements of marketing concept in their organisation which are customer orientation, organisation integration and mutually profitable exchange. CUSTOMER ORIENTATION MARKETING ENVIRONMENT IN STARBUCKS. An organisation can be structured in the certain ways that implements the goal of the organisation such factors can be interfered externally which is termed as Macro environment and internally known by Micro environment. Environment can change due to certain circumstances where by the organisation such as Starbucks can manage such change by having marketing plans, proper promotion, well distribution manner and proper pricing method in advance in case changes happened. Macro environment analysis These are the forces that affect the organisation externally in a very large part such as political, economical, social and technological (PEST) Political Factor This is relating to the huge amount of tax imposed to the business by the government which tend to interfere the organisation activities when it wants to maximise its profit. Political factor from other branches in other countries where could be wars, dictatorial government, civil wars that may influence the marketing environment of the organisation. Also laws imposed to the organisation where by the government restricting shops from selling alcohol at certain time, ethics practice child labour, health and safety, fair trade etc which organisations need to practice them. Economical Factor Economic factors such as recession which hard a big impact to the different organisations also to the consumer ability to purchase their product due to been unemployed and having debts. As UK joined European Union introduced free movement of goods and services that result to the occurrence of competitions among the organisation. The way income is distributed among the individuals impact the marketing activities such as higher income earners, middle and low earners these are economic factor influence marketing segmentation and decisions. Social factor Social factors that influence marketing decisions are such as demographic factors which is relating to the population where when the population increases creates good opportunity for the marketing activities but if it decreases results to great impact in the market. Age, marketers tend to target their market according to the number of age available in an area. Behaviour also may influence the marketing decision where by some ethnics may not be able to purchase certain products due religion aspects also due to consumers different in taste, style and fashion some may like the products others may find them not attractive. Technological factor This is spread of advance technology which is changing the world in rapid state where now consumers can buy their products online; or decide to but coffee machines and make their own coffee at home organisation can market their products through various social networks such as Facebook, Twitter which are being used by the people regularly such factors does influence marketing decisions when they decide to plan their marketing activities. PORTERS FIVE FORCES Porters Five Forces Model can be used by the company to identify its opportunities and threats of their competitors. Starbucks can use such model to be able to enter new reach markets. Starbucks has few competitors such a Cafe Nero, Costa coffee, Coffee republic such find it hard to compete with Starbucks due to that Starbucks have got good opportunity in the volume of operations. Starbucks is the leading coffee retailer in the world having good brand. (Kembell). Threats that Starbucks faces are cities that have small number of population due to having low number of competitors that Starbucks find it hard to compete. Starbucks is well known in the coffee market for its innovation and strong product differentiation. Starbucks has introduced the prepaid debit card; Seattles Best launched its version. STAKEHOLDERS ANALYSIS Stakeholder is any person who has the direct or indirect interest in the company. Examples of stakeholders are customers, suppliers, government, employees, other agencies etc. Stakeholders are of the great importance to any organisation without them the organisation wont be able be able to survive, their needs need to be met by organisations such operating marketing activities in ethical way, abiding to the laws and regulations regarding to business, protecting the environment from any harm, they can manage to sustain the marketing activities etc If such needs are not fulfilled they have the power to cause destruction in the marketing plan and decisions.