Free Essay

Soley

In:

Submitted By chomsome
Words 2369
Pages 10
SlideShare
-------------------------------------------------
Top of Form

Bottom of Form * Upload * Browse * Go PRO * Login * Signup * Email * Favorite * Save * Flag * Embed

Intel8086MICROPROCESSOR1

FeaturesItisa16-bitμp.8086hasa20bitaddressbuscanaccessupto220memorylocations(1MB).Itcansupportupto64KI/Oports.Itprovides14,16-bitregisters.Wordsizeis16bits.IthasmultiplexedaddressanddatabusAD0-AD15andA16–A19.Itrequiressinglephaseclockwith33%dutycycletoprovideinternaltiming.2
«‹›»
/30 * Related * More * 02 architecture121 views * 2009 Punjab Technical University B.C.A Microprocessor Question paper1277 views * Qoestion Bank Big Questions5341 views * MELJUN CORTES DATA FORMAT108 views * M I C R O P R O C E S S O R S A N D I N T E R F A C I N G J N T U M O D E L …630 views * M.sc I-sem-8086 notes796 views * M.sc I-sem-8086 notes1049 views * Unit 12899 views * Lect 51529 views * microprocessor & programming1835 views * Evolution Of Microprocessor34001 views * 1326 Introduction To 8086 Microprocessor9356 views * 8086 introduction159 views * Mc1702 micro processor317 views * Micro Lec 11859 views * Evolution Of Microprocessors13171 views * Microprocessors 1-8086168 views * Ei502microprocessorsmicrtocontrollerspart5 sixteen bit8086 1335 views * Course plan mp2067 views * Microprocessor laboratory1086 views * Microprocessor and microcontroller lab viva questions1325 views * CPU HISTORY MUKUND532 views * The x86 Family7890 views * 13402 lecture 1877 views * 14910 ece301 hw266 views * Al2ed chapter3219 views * Sistem mikroprosessor701 views * M1 l3132 views * 23145586 views * 231455 281 views * Microprocessors80852959 views * Chapter8-mikroprocessor399 views * Processor481 views * Ei502 microprocessors & micrtocontrollers part 1704 views * 13402 m1 l4_2275 views * Mpmc111 views * Lec 03 ia32 architecture329 views * 8086 class notes-Y.N.M9164 views * Micro[processor355 views * Love as it is to me * -------------------------------------------------

* -------------------------------------------------

* -------------------------------------------------
0
inShare * -------------------------------------------------

* -------------------------------------------------
Pin It * -------------------------------------------------
Wordpress
+ Follow
8086 microprocessor-architecture by prasadpawaskar on Feb 07, 2012 * 17,396views
The simplest way to learn the 8086 microprocessor in complete detail!!
More…
* 4 comments
1–4 of 4 commentsPost a comment * -------------------------------------------------
Gaurav Ratzzgood2 months ago * -------------------------------------------------
Sandela Swathithanksss alottttt,its useful.3 months ago * -------------------------------------------------
Ako Cee Jae Sun at ownskin.comthnks ^^3 months ago * ------------------------------------------------- tarasonami like it6 months ago
-------------------------------------------------
Top of Form

Subscribe to commentsPost Comment
Bottom of Form * 6 Favorites * ------------------------------------------------- mskhan10101 week ago * -------------------------------------------------
Vivek Ov1 week ago * -------------------------------------------------
Taimoor Khan2 weeks ago * -------------------------------------------------
Madhu Kotapati3 weeks ago * -------------------------------------------------
OOOOAI2 months ago * tarasonam6 months ago
-------------------------------------------------
8086 microprocessor-architecturePresentation Transcript * 1. Intel 8086MICROPROCESSOR 1 * It requires single phase clock with 33% duty cycle to provide internal timing. 2 It has multiplexed address and data bus AD0- AD15 and A16 – A19. Word size is 16 bits. It provides 14, 16 -bit registers. It can support up to 64K I/O ports. 8086 has a 20 bit address bus can access up to 220 memory locations (1 MB). It is a 16-bit μp.2. Features * Memory is byte addressable - Every byte has a separate address. 3 Address ranges from 00000H to FFFFFH A 40 pin dual in line package. It requires +5V power supply. It can prefetches up to 6 instruction bytes from memory and queues them in order to speed up instruction execution. 8086 is designed to operate in two modes, Minimum and Maximum.3. * 4. Intel 8086 Internal Architecture 4 * 5. Internal architecture of 8086• 8086 has two blocks BIU and EU.• The BIU handles all transactions of data and addresses on the buses for EU.• The BIU performs all bus operations such as instruction fetching, reading and writing operands for memory and calculating the addresses of the memory operands. The instruction bytes are transferred to the instruction queue.• EU executes instructions from the instruction system byte queue. 5 * 6. • Both units operate asynchronously to give the 8086 an overlapping instruction fetch and execution mechanism which is called as Pipelining. This results in efficient use of the system bus and system performance.• BIU contains Instruction queue, Segment registers, Instruction pointer, Address adder.• EU contains Control circuitry, Instruction decoder, ALU, Pointer and Index register, Flag register. 6 * 7. EXECUTION UNIT• Decodes instructions fetched by the BIU• Generate control signals,• Executes instructions.The main parts are:• Control Circuitry• Instruction decoder• ALU 7 * 8. EXECUTION UNIT – General Purpose Registers 16 bits 8 bits 8 bits AH AL AX Accumulator BH BL Base BX CX CH CL Count DX DH DL Data SP Stack Pointer Pointer BP Base Pointer SI Source Index Index DI Destination Index 8 * 9. EXECUTION UNIT – General Purpose Registers Register PurposeAX Word multiply, word divide, word I /OAL Byte multiply, byte divide, byte I/O, decimal arithmeticAH Byte multiply, byte divideBX Store address informationCX String operation, loopsCL Variable shift and rotateDX Word multiply, word divide, indirect I/O (Used to hold I/O address during I/O instructions. If the result is more than 16-bits, the lower order 16-bits are stored in accumulator and higher order 16-bits are stored in DX register) 9 * 10. Pointer And Index Registers• used to keep offset addresses.• Used in various forms of memory addressing.• In the case of SP and BP the default reference to form a physical address is the Stack Segment (SS-will be discussed under the BIU)• The index registers (SI & DI) and the BX generally default to the Data segment register (DS). SP: Stack pointer – Used with SS to access the stack segment BP: Base Pointer – Primarily used to access data on the stack – Can be used to access data in other segments 10 * 11. • SI: Source Index register – is required for some string operations – When string operations are performed, the SI register points to memory locations in the data segment which is addressed by the DS register. Thus, SI is associated with the DS in string operations.• DI: Destination Index register – is also required for some string operations. – When string operations are performed, the DI register points to memory locations in the data segment which is addressed by the ES register. Thus, DI is associated with the ES in string operations.• The SI and the DI registers may also be used to access data stored in arrays 11 * flags –control Flags 3 U U U U OF DF IF TF SF ZF U AF U PF U CF Sign Auxiliary Carry Interrupt Trap Zero Parity Over flow Direction U - Unused 126 flags indicates some conditions- status flags of the 16 are active flags and remaining 7 are undefined. 9 a 16 bit flag register 12. EXECUTION UNIT – Flag Register• A flag is a flip flop which indicates some conditions produced by the execution of an instruction or controls certain operations of the EU .• In 8086 The EU contains * 13. EXECUTION UNIT – Flag Register Flag PurposeCarry (CF) Holds the carry after addition or the borrow after subtraction. Also indicates some error conditions, as dictated by some programs and procedures .Parity (PF) PF=0;odd parity, PF=1;even parity.Auxiliary (AF) Holds the carry (half – carry) after addition or borrow after subtraction between bit positions 3 and 4 of the result (for example, in BCD addition or subtraction.)Zero (ZF) Shows the result of the arithmetic or logic operation. Z=1; result is zero. Z=0; The result is 0Sign (SF) Holds the sign of the result after an arithmetic/logic instruction execution. S=1; negative, S=0 13 * 14. Flag Purpose A control flag.Trap (TF) Enables the trapping through an on-chip debugging feature. A control flag.Interrupt (IF) Controls the operation of the INTR (interrupt request) I=0; INTR pin disabled. I=1; INTR pin enabled. A control flag.Direction (DF) It selects either the increment or decrement mode for DI and /or SI registers during the string instructions. Overflow occurs when signed numbers are added orOverflow (OF) subtracted. An overflow indicates the result has exceeded the capacity of the Machine 14 * 15. Execution unit – Flag Register• Six of the flags are status indicators reflecting properties of the last arithmetic or logical instruction.• For example, if register AL = 7Fh and the instruction ADD AL,1 is executed then the following happen AL = 80h CF = 0; there is no carry out of bit 7 PF = 0; 80h has an odd number of ones AF = 1; there is a carry out of bit 3 into bit 4 ZF = 0; the result is not zero SF = 1; bit seven is one OF = 1; the sign bit has changed 15 * 16. BUS INTERFACE UNIT (BIU)Contains• 6-byte Instruction Queue (Q)• The Segment Registers (CS, DS, ES, SS).• The Instruction Pointer (IP).• The Address Summing block (Σ) 16 * 17. THE QUEUE (Q)• The BIU uses a mechanism known as an instruction stream queue to implement a pipeline architecture.• This queue permits pre-fetch of up to 6 bytes of instruction code. Whenever the queue of the BIU is not full, it has room for at least two more bytes and at the same time the EU is not requesting it to read or write operands from memory, the BIU is free to look ahead in the program by pre-fetching the next sequential instruction. 17 * 18. • These pre-fetching instructions are held in its FIFO queue. With its 16 bit data bus, the BIU fetches two instruction bytes in a single memory cycle.• After a byte is loaded at the input end of the queue, it automatically shifts up through the FIFO to the empty location nearest the output.• The EU accesses the queue from the output end. It reads one instruction byte after the other from the output of the queue.• The intervals of no bus activity, which may occur between bus cycles are known as Idle state. 18 * The Complete physicallyavailable memory may be Stack segment (64KB)divided into a number of logicalsegments. FFFFF 19The CPU 8086 is able to Data segment (64KB) 1 MBaddress 1Mbyte of memory. Extra segment (64KB)The memory in an 8086/88based system is organized assegmented memory. Code segment (64KB)19. Physical MemorySegmented Memory 00000 * 20. • The size of each segment is 64 KB• A segment is an area that begins at any location which is divisible by 16.• A segment may be located any where in the memory• Each of these segments can be used for a specific function. – Code segment is used for storing the instructions. – The stack segment is used as a stack and it is used to store the return addresses. – The data and extra segments are used for storing data byte. * In the assembly language programming, more than one data/ code/ stack segments can be defined. But only one segment of each type can be accessed at any time. 20 * 21. • The 4 segments are Code, Data, Extra and Stack segments.• A Segment is a 64kbyte block of memory.• The 16 bit contents of the segment registers in the BIU actually point to the starting location of a particular segment.• Segments may be overlapped or non-overlappedAdvantages of Segmented memory Scheme• Allows the memory capacity to be 1Mb although the actual addresses to be handled are of 16 bit size.• Allows the placing of code, data and stack portions of the same program in different parts (segments) of the m/y, for data and code protection.• Permits a program and/or its data to be put into different areas of memory each time program is executed, i.e. provision for relocation may be done .• The segment registers are used to allow the instruction, data or stack portion of a program to be more than 64Kbytes long. The above can be achieved by using more than one code, data or stack segments. 21 * 22. Segment registers• In 8086/88 the processors have 4 segments registers• Code Segment register (CS), Data Segment register (DS), Extra Segment register (ES) and Stack Segment (SS) register.• All are 16 bit registers.• Each of the Segment registers store the upper 16 bit address of the starting address of the corresponding segments. 2223. 23 * 24. MEMORY 00000BIU Segment Registers 34BA0 CODE (64k) 44B9FCSR 34BA 44EB0 DATA (64K) 1 MBDSR 44EB 54EAF 54EB0ESR 54EB EXTRA (64K) 64EAFSSR 695E 695E0 STACK (64K) 795DF Each segment register store the upper 16 bit of the starting address 24 of the segments * 25. Instruction pointer & summing block• The instruction pointer register contains a 16-bit offset address of instruction that is to be executed next.• The IP always references the Code segment register (CS).• The value contained in the instruction pointer is called as an offset because this value must be added to the base address of the code segment, which is available in the CS register to find the 20-bit physical address.• The value of the instruction pointer is incremented after executing every instruction.• To form a 20bit address of the next instruction, the 16 bit address of the IP is added (by the address summing block) to the address contained in the CS , which has been shifted four bits to the left. 25 * 26. 26 * 27. • The following examples shows the CS:IP scheme of address formation: CS 34BA IP 8AB4 Code segment 34BA0Inserting a hexadecimal 0H (0000B) with the CSR or shifting the CSR 8AB4 (offset) four binary digits left 3D645 34BA0(CS)+ 8AB4(IP) 3 D 6 5 4 (next address) 44B9F 27 * 28. • Example For Address Calculation (segment: offset) • If the data segment starts at location 1000h and a data reference contains the address 29h where is the actual data?Offset 0000 0000 0010 1001Segment Address 0001 0000 0000 0000 0000Required Address 0001 0000 0000 0010 1001 28 * 29. Segment and Address register combination• CS:IP• SS:SP SS:BP• DS:BX DS:SI• DS:DI (for other than string operations)• ES:DI (for string operations) 29 * 30. Summary of Registers & Pipeline of 8086 µP EU BIUAX AH AL IPBX BH BL Fetch &CX CH CL D store code CS DS ES SS EDX DH DL C bytes in C O PIPELINE C O O IP BX DI SP D PIPELINE SP D E (or) D DI BP E O QUEUE E BP I SI R U SI T N DI Default Assignment Timing FLAGS ALU control 30
-------------------------------------------------
Top of Form

Bottom of Form * Connect on LinkedIn * Follow us on Twitter * Find us on Facebook * Find us on Google+ * LEARN ABOUT US * About * Careers * Our Blog * Press * Contact us * Help & Support * USING SLIDESHARE * SlideShare 101 * Terms of Use * Privacy Policy * Copyright & DMCA * Community Guidelines * SlideShare on mobile * PRO & MORE * Go PRO new * Business Solutions * Advertise on SlideShare * DEVELOPERS & API * Developers Section * Developers Group * Engineering Blog * Blog Widgets
© 2013 SlideShare Inc. All rights reserved.
RSS Feed * ENGLISH

Similar Documents

Premium Essay

Buisness Management

...- David and Price state that “students today adopted an increasingly consumerist goal for their education” (61)” in a sense that they “perceive themselves primarily as costumers, purchasing a product: a degree” (61) - This raises the question of why students have a consumerist view on education and whether students value the learning process of obtaining a college degree - The study indicates that most students“seek the path of least resistance to obtaining a academic degree.” - This suggest that students may not value the learning process or the end product of knowledge to be of any importance and instead, they are only interested in obtaining a degree though the easiest method by selecting professors based on their easiness rating. - Personally, i find this surprising - what is the purpose of higher education if it presented no challenges? - more importantly, what is the significance of an academic degree if student's take the easier route? - An academic degree is of special value that indicates a student's innate ability - If all students obtain a degree by choosing the easiest path, this will devaluate the significance of an academic degree - And thus, an academic degree will have no meaning  - Perhaps student's may need reassess their value on education and realize the importance of the learning process Although obtaining a degree is the primary goal of many students, the learning process is also of equal importance Brinkworth first year experience ...

Words: 1594 - Pages: 7

Premium Essay

Six Basic Principles Of Government

...The six basic Principles of the us constitution The six Principles of Government found in the Constitution of the United States are Popular Sovereignty Checks and Balances, Federalism, Limited Power of the Government, Separation of Branches. Popular Sovereignty means the ultimate power rests with the people an example would be "The U.S goverment can only govern with the consent of its citizens. all goverment leaders exist soley to serve the people". Checks and Balances means that no one branch of the government can overpower the other branches of government. Each has a check on the power of the other branches. An example would be how it is a safe gaurd from tyranny by any one branch of goverment making any loss of speed worthwhile when looking...

Words: 287 - Pages: 2

Premium Essay

Cert Program in Santa Cruz County

...about and why “The Community Emergency Response Team concept was developed and implemented by the Los Angeles City Fire Department (LAFD) in 1985. The Whittier Narrows earthquake in 1987 underscored the area-wide threat of a major disaster in California. Further, it confirmed the need for training civilians to meet their immediate needs. As a result, the LAFD created the Disaster Preparedness Division with the purpose of training citizens and private and government employees.” (citizenscorps.gov/cert/about.shtm, no d) CERT’s social initiative is to provide a service to the community during emergencies when all public safety resources are being utilized by true emergencies. When 9/11 happened, our public governments realized that relying soley upon our public safety organizations such as our fire departments and police departments weren’t enough. The CERT program offered the relief needed during major events or disasters. “First responders need to be educated about the CERT and their value to the community. Using CERT as a component of the response system when there are exercises for potential disasters can reinforce this idea.” (citizenscorps.gov/cert/about.shtm, no d) The potential ethical effects that CERT has upon the community social initiative is the...

Words: 459 - Pages: 2

Free Essay

Assumption

...agree with Ackoff's contention. I'm working in different business office settings I can agree with the author when he says that most managers receive more data than they can possibly absorb in a given day. It is true that managers are swamped piles of information and data whether it be physically or electronically. Because I am not a manager I cannot specifically say that management needs some more information however I feel it is appropriate and more efficient to have the information that you need Than information that is not needed or irrelevant or a waste. At the end of the day it is the responsibility of management to in sure that things are efficient and that resources I used accordingly perhaps if workers and management focused on soley and exactly what was needed for the company the assumption that management needs more information may be looked at from a different angle. Assumptions 2: managers need the information they want This assumption basically says that management information system designers Ask managers what information they need in order to create the MIS! Technically speaking you would think that this is the right way to do it. Also I do not think the author entirely disagrees with the assumption but I feel as then he believes that it is impossible for a manager she knew exactly what information he needs. With this being said the author thinks that the manager is Flooded with all this information...

Words: 391 - Pages: 2

Premium Essay

Lilly Ledbetter: The Inequality Of Women

...As society grows and changes, the problems it faces become different. However, one problem that has remained the same throughout the years is the inequality of women, more specifically the wage inequality. In her Brooklyn Rail article about Lilly Ledbetter, Alexis Clements writes that, in 1979 Lilly Ledbetter began to work as a manager at a Goodyear Tire and Rubber company in Gadsden, Alabama. Lilly was the only woman at the time working as a manager and her starting pay was equal to that of her male counterparts. After 19 years of working at Goodyear, she received an anonymous note informing her of the salary of three of her male coworkers and realized that she was making much less than them. Lilly was enraged when she began to think about...

Words: 373 - Pages: 2

Premium Essay

Dog Park Research Paper

...I believe a dog park in Muscantine, Iowa would be a good idea. Many people are dog owners, and when living in the city, it sometimes makes it difficult for dog owners to excercise their dogs in such limited space. Not only will it be beneficial to the dog, but the owner as well, as he or she will also be able to get excercise with their dog and will create a stronger bond with the person and the dog. A dog park will help a dog burn off energy. This way the dog will not be so bored at home and become destructive and start displaying unwelcoming behavior. Most of the time when bad behavior is displayed dogs are given up and it does not have to be this way. Dogs need to run, play, and socialize with other dogs, it's in their nature as a pack...

Words: 389 - Pages: 2

Premium Essay

My Secret Life As A Black Man Summary

...This stereotype that the blacks are criminals gives perople a reason to hate or dislike blacks solely based on this stereotype. I think todayt racism is not based on hate, but on prejugdments created by society. There are many form of generalization that is not soley based on race, this includes gender, class, sexual orientation, belief, and many other small things. Racial prejudice and racism can harm not only the victims, but also the large society, and inderictly the very people who are engaging in the acts. To alleviate prejudice is not simple and does not happen over night, but by educating people stereotyping in society will reduce. We should start informing people with the media; this includes the newspaper, tv, and radio station, mainly because the media plays an important role in carrying messages to the public. For instance, the reporters always reveal the cultiral background of a group of lortering youth when they are of color, but not otherwise. Therefore by informing the schools and the neighborhoods...

Words: 469 - Pages: 2

Premium Essay

Technology in Mh Counseling

...Technology in Mental Health Counseling Tiauana Robinson MidAmerica Nazarene University The section on the American Mental Health Counselors Association “About Mental Health Counselors” upholds a great deal of information. It answers a variety of questions that the profession has on a daily basis such as “What is a Clinical Mental Health Counselor? Where can you find a Clinical Mental Health Counselor? What makes a good counselor? And What exactly is the American Mental Health Counselors Association?” To summarize and answer these questions a clinical mental health counselor is simply an individual in the helping field that provides flexible consumer oriented therapy that withholds the proper education, practice and training in the national standards. You can find a mental health counselor in various settings such as Psychiatric Hospitals, private practices, substance abuse treatments and etc. I also found the YouTube video titled “Evidence-based Treatment: What does it mean” and it gives advice on how to find a good counselor by reviewing three facts 1. Number of Studies: same outcome by different people in different settings 2. Quality of Studies: the treatment is being compared to another treatment with individuals being assigned to the treatment groups randomly and the groups are the same in the beginning but one group will have a...

Words: 480 - Pages: 2

Premium Essay

Personal Reflection

...jobs, and getting home late at night, stopping at a “Chick fil A” or “Friday’s” is typrically more convenient for me. Busy schedules often diminish the amount of time people have to prepare healthy, nutritious meals, so they opt for faster, easier options. Whole foods such as vegetables and meat take time and kitchen equipment to cook properly, while fast food hamburgers are usually served within minutes of ordering. Over time, that convenience becomes a habit and eventually a perceived necessity to keep up with such a fast-paced society. Disrupting that routine requires an investment of time, and most people prefer to stick with the faster option.Because of this, my cholesterol levels has elevated.. Having said that, my preference in food soley consist of pizza, fries,...

Words: 417 - Pages: 2

Premium Essay

Theories of Psycology

...relationship between environment, events, and behaviors. It tends to explain the learning in terms of behavior that can be observed, avoiding reference to mental events and entities. Drills are examples of behaviorism. They involve steady repetition of a desired action. Behaviorist theory encourages repeating a behavior to act as reinforcement of that behavior. Drills are often used in teaching with things that require memorization such as multiplication tables. Behaviorism influences psychology today by applying the principles in mental health setting, where the therapists and counselors these to explain and treat a variety of illnesses. Functionalism is the philosophy that every feeling, emotion, or thought in the mind is associated soley with the idea each has a function. It is cause and effect idea of how each outside stimuli corresponds to a mental state which causes a reaction. (MacMillion, 1996) An example of functionalism is pain, which is a state that tends to be caused by bodily injury. It produces the belief that something is wrong with the body. The effect could produce anxiety, and in the absence of any stronger, conflicting desire could cause wincing or moaning. Functionalism does not exist today as a separate school of thought. Because of its success, there is no longer any need for it to retain the characteristics of a school. It has left its...

Words: 569 - Pages: 3

Premium Essay

Education Accountability

...While these initiatives, program ideas, and teacher investments are important, but the problem with America’s educational system is that there is one common denominator not being considered; students themselves. Building new schools, rezoning, creating smaller class sizes, and offering incentives for teachers to further their education are great ways to boost invest in education, but how will any of these initiatives motivate a student who does not want to learn? If a student did not want to learn in the class of a teacher who has a bachelor’s degree, will putting that child in the class of a teacher with a master’s degree make them want to learn? . Far too long have teachers, administrators, and other school board officials been blamed soley for students’ failure and lack of success in the classroom when in they should not only share the blame, but be blamed less. Parents and students themselves should be held more accountable for students’ success in the classroom. There are factors that make up students that no teacher or administrator can control such as the students’ home environment, genetic makeup, and life experiences. All of these things can affect student achievement. Teachers and administrators have been blamed so much that there are programs in place...

Words: 579 - Pages: 3

Free Essay

Rape

...minors rights, the main people who sipports statutory rape are the ones who would agree that any relationship where a once legal age partner is significantly older that the other. The one that is also younger than the youngest and would take advantage of the younger one, even if the person underage agrees to the sexual activity is still considered unlawful because the person is not mature enough to make smart decisions . now most adults fear that younger people in the relationship may have been forced due to their emotions and began to engage sexual activities with their partner One the other hand those who disagrees with statutory rape laws claim that problems rises when young legal aged men are sentenced to jail for the crimes based on soley...

Words: 617 - Pages: 3

Free Essay

Violence in the Media

...Violence in the media has been a growing problem ever since the emergence of mass media. You have to wonder how violence has become so prominent in our culture. More minors are being involved in heinous crimes such as murders and armed robberies. Even play on the school ground is getting rougher. There are many factors that play into the increasing violence, such as over population, religious struggles, and race. One factor that plays into the increase of violence would be mass media. Mass media has the power to reach and influence almost every American. Radio, newspaper, and television are all means by which media reaches people. Television however, can be considered the most influential. Ninety-eight percent of Americans have a television in their household. When it first came out it was considered a novelty, there were only a few channels and the signal was not very clear. Now it is available through air broadcast, cable, or satellite. Television has become part of everyday life. With the growing fixation and attraction to violence in the media, children in today’s society are becoming more violent and aggressive. After reading the article "Violent Culture: The Media, the Internet, and Placing Blame," the author brings up the point that the media was turning the focus of blame in Kip Kinkel case on the internet. He cited examples of how easily information about building bombs and guns was to get on the internet. Yes these types of things are easily found on the internet...

Words: 538 - Pages: 3

Premium Essay

Eth125 Final

...been I feel that the population in the United States will be mostly African Americans and Hispanics. I say this because they are the Majority of the minorities we have here. Eventually they will be equal to the amount of whites we have and from their rise to greater numbers. * * The United States face many challenges due to the diversity of people we have here. Those challenges include difference such as religion, racism, and prejudice. People from different parts of the world practice different beliefs, which is not a bad thing. However, there are people who were raised to believe that some people are inadequate or “below” them. Prejudice is a serious matter as it is never okay to discrimate against any person or group of people soley because they do not think the same way as you. * * Having diversity in a society does have benefits also. People who are open minded are given the chance to learn about new cultures and religion that they would normally not have the chance to see first hand. This can also lead to the possibility of minimizing rascim and discrimination. When a person or group of people are exposed to different types of people they tend to view it as the norm and do not believe that one group of people are any better then anyone else. * * The media plays a greater role in stereotyping and prejudice than I originally thought they did. Whenever I watch the news and...

Words: 520 - Pages: 3

Free Essay

Objectification of Women vs Sex Sells

...Objectification of women Vs. "Sex Sells": Where is the Line drawn Why is it that we have become impervious to the objectification of women today? Why do a large group of men and women allow and condone this type of behavior? A perfect example of this is my friend Chad. He is your stereotypical play-boy. In his mind he is God's gift to women. One day we were at the bar. He was doing his usually "surveillance" as he called it. Looking around trying to find out which girl would be most likely to go home with him just by their physical appearance. I thought of it more as his predatorily stalking like a hyena looking for a wounded calf in a herd of buffalo. (No objectification meant) His eyes fixated on a women in her mid twenties with red hair and a super model body. It wasn't an hour later that he left the bar with her, leaving me in the company of a sweating Heineken and a $53 tab. Two days later we met up and lounged on his porch in the late afternoon enjoying the cool weather. He began to brag about the red haired woman he took home. He nicknamed her "Lips" for reasons I prefer not to get into but spoke of her actions during their little sexual escapade. He spoke in graphic detail about things I just didn't care to hear. After a few minutes of this assault Chad asked me what I had done after he left. I don't know if it was anger that compelled me but something motivated me to do something I have avoided doing in a long time. I began to speak of an explicit encounter...

Words: 2040 - Pages: 9