Preview

Unit 1 Assignment 1: Integrated Circuit Technology

Satisfactory Essays
Open Document
Open Document
400 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1: Integrated Circuit Technology
Processor
Transistor count
Date of introduction
Manufacturer
Process
Area
Intel 4004
2,300
1971
Intel
10 µm
12 mm²
Intel 8008
3,500
1972
Intel
10 µm
14 mm²
MOS Technology 6502
3,510[1]
1975
MOS Technology
8 μm
21 mm²
Motorola 6800
4,100
1974
Motorola
6 μm
16 mm²
Intel 8080
4,500
1974
Intel
6 μm
20 mm²
RCA 1802
5,000
1974
RCA
5 μm
27 mm²
Intel 8085
6,500
1976
Intel
3 μm
20 mm²
Zilog Z80
8,500
1976
Zilog
4 μm
18 mm²
Motorola 6809
9,000
1978
Motorola
5 μm
21 mm²
Intel 8086
29,000
1978
Intel
3 μm
33 mm²
Intel 8088
29,000
1979
Intel
3 μm
33 mm²
Intel 80186
55,000
1982
Intel
3 μm

Motorola 68000
68,000
1979
Motorola
3.5 μm
44 mm²
Intel 80286
134,000
1982
Intel
1.5 µm
49 mm²
WDC 65C816
22,000[2]
1983
WDC

Motorola 68020
200,000
1984
Motorola
2 μm

Intel 80386
275,000
1985
Intel
1.5 µm
104 mm²
ARM 1
25,000[3]
1985
Acorn

ARM 2
25,000
1986
Acorn

Intel i960
250,000[4]
1988
Intel
0.6 µm

Intel 80486
1,180,235
1989
Intel
1 µm
173 mm²
ARM 3
300,000[5]
1989
Acorn

R4000
1,350,000
1991
MIPS
1.0 µm
213 mm²
ARM 6
30,000
1991
ARM

Pentium
3,100,000
1993
Intel
0.8 µm
294 mm²
ARM 7
578977[6]
1994
ARM

68.51 mm²
Pentium Pro
5,500,000[7]
1995
Intel
0.5 µm
307 mm²
AMD K5
4,300,000
1996
AMD
0.5 µm
251 mm²
Pentium II
7,500,000
1997
Intel
0.35 µm
195 mm²
AMD K6
8,800,000
1997
AMD
0.35 µm
162 mm²
Pentium III
9,500,000
1999
Intel
0.25 µm
128 mm²
AMD K6-III
21,300,000
1999
AMD
0.25 µm
118 mm²
AMD K7
22,000,000
1999
AMD
0.25 µm
184 mm²
Pentium 4
42,000,000
2000
Intel
180 nm
217 mm²
Atom
47,000,000
2008
Intel
45 nm
24 mm²
Barton
54,300,000
2003
AMD
130 nm
101 mm²
AMD K8
105,900,000
2003
AMD
130 nm
193 mm²
Itanium 2 McKinley
220,000,000
2002
Intel
180 nm
421 mm²
Cell
241,000,000
2006
Sony/IBM/Toshiba
90 nm
221 mm²
Core 2 Duo
291,000,000
2006
Intel
65

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 10 Assignment 1

    • 256 Words
    • 1 Page

    First of all I would recommend that you use Raid-1 as your fault-tolerant hardware. RAID-1 is most often deployed with two disks. The disks are mirrored – providing fault tolerance. Read performance is increased while write performance will be similar to a single disk – if not less. A single disk failure can be sustained without data loss. RAID-1 is often used when fault tolerance is key and there isn’t an exceptional space or performance requirement.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 235 Words
    • 1 Page

    A common problem that happens is assuming as soon as DHCP options are changed that all PCs will automatically implement them.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 5 assignment 1

    • 423 Words
    • 3 Pages

    6. When determining if a number is within a range, the OR operator would be best to use.…

    • 423 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 306 Words
    • 4 Pages

    References: A History of Microprocessor Transistor Count. (2013, August 29). Retrieved March 22, 2014, from Wagnercg: http://www.wagnercg.com/Portals/0/FunStuff/AHistoryofMicroprocessorTransistorCount.pdf…

    • 306 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 1

    • 597 Words
    • 2 Pages

    RAID stands for either redundant array of independent disks or redundant array of inexpensive disks.…

    • 597 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Int1 Unit 10 Research

    • 855 Words
    • 4 Pages

    "TIME Magazine Cover: Bill Clinton, Man of the Year - Jan. 4, 1993." Time. Time Inc.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT110

    • 290 Words
    • 3 Pages

    From 1971 to 2012 the Intel processor transistor count has increased extremely throughout the years developing processor that meets modern pc needs. The growth in the number of transistors used in integrated circuits over the years is reasonable because, of Moore’s Law which predicted that every one year and a half to two years the capacity of the processors would double and, as we can see it is true. The growth on the transistors look surprisingly fast but at the same it is common because technology is used more than ever and to meet the needs of today’s society so reflecting on it is appropriate to say that it is growing at a normal rate. If I had to figure out when 100 billion transistors would fit on one single chip and using the of Moore’s law I would predict that it be around from 2018 to 2020.…

    • 290 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996. The main purpose of this law was to improve the flow of health information. At this time, the great majority of the records were still in paper form, however there was a push for the healthcare industry to become digital. Prior to 1996, the only federal law that regulated the privacy of health information was the Privacy Act of 1974. Between 2003 and 2005, there were more than 13,000 privacy complaints, but no civil enforcement actions were brought by the HHS Office for Civil Rights (OCR). In that same period, there was only one HIPAA criminal action, against a lab assistant who used the personal data of a terminal cancer patient for identity theft. By 2008, 33,000 + complaints had been filed with OCR, only about 8,000 were investigated with 5,600 leading to corrective action, yet no fines had been issued. Several key dates for HIPAA since then are: February 17, 2009- ARRAs HITECH Act Signed into Law. HIPAA revised to strengthen enforcement penalties, require breach notifications, and expand patient rights 2009OCR increases HIPAA Enforcement January 25, 2013- HITECHs HIPAA Modification Final Rule Release There is no single part of the HIPAA complaint form that should be singled out for attention, other than simplifying the form completion instructions. In the situation where every instructor Brandon ford Mr. Redmond 1-14-2015 IS3350 and all associated staff had access to the students health care records, Premier College is in direct violation of HIPAA.…

    • 253 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    3) Why would this affect child labor-Why is the labor force utilizing children-shouldn’t they be in school…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 5 Assignment 1

    • 1034 Words
    • 5 Pages

    There are many avenues that the fire service can utilize to reduce the injuries, deaths, cost and risks that fire poses to firefighters and those in the community. Among these numerous avenues that are at the fire service’s disposal, in my opinion, the most effective is the presence of fire suppression systems in homes. With that being said, I’m in support of requiring the installation of fire sprinklers in homes, for while there may be an initial financial hit, there are far more pros than cons; such as reducing injury, death and cost of fires.…

    • 1034 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 352 Words
    • 2 Pages

    My name is Destiny Knott, my family and I have recently moved into a house overlooking the park in the neighborhood of Park Hall. I would like to draw your attention to some of the lewd and lascivious acts that take place daily in Park Hall. On many separate occasions up to several times a day, I have noticed from my window or front porch a crowd of undesirable individuals sitting on the benches. Numerous times these individuals have been seen drinking alcohol and carrying on very loudly, using the foulest kind of language. On another occasion my family and I have witnessed a violent fight occur right in front of the park where all of our children play. It is an outrage that our young innocent children should have to listen to and witness such inappropriate displays of behavior.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    assignment1 soc109 02

    • 808 Words
    • 3 Pages

    An anthropological introduction to Youtube is one of the presentations by Michael Wesch of Kansas State University. He teaches a class called Digital Ethnography, and “ethnography is the study of a culture.” Nowadays, there are many kinds of mass media appearing to connect people around the world. Thus, on Michael Wesch’s website, he writes, “Our work explores how humans use media, how media uses us, and how we can use new media to reveal our insights in new ways.” That a reason why he and his team studied the culture in Youtube.…

    • 808 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cs 2205 Unit 6 Assignment

    • 533 Words
    • 3 Pages

    This is unit 6 personal reflections that basically depends on the unit given reading materials and that is related to. This week my journal activity basically very focused specifically on the weekly unit topic of basic syntax of XML, transporting and storing with XML.…

    • 533 Words
    • 3 Pages
    Good Essays

Related Topics