Cara Install Windows XP dengan Flashdisk

Cara menginstall windows xp menggunakan media flasdisk untuk netbook.
usb Cara 
Install Windows XP dengan Flashdisk
Akhir-akhir ini banyak sekali orang memilih jenis Komputer Netbook untuk dipakai sehari-hari karena harganya yang murah dan juga bentuknya yang kecil praktis dibawa kemana-mana. kelemahannya Netbook ini tidak dilengkapi dengan Cd room tau pun DVD room sehingga ketika kita ingin menginstall ulang windows karena rusak akibat virus sangat sulit kecuali mempunyai CD/DVD room externall. Tapi hal ini bisa diatasi dengan adanya teknologi Flasdisk yang semakin hari semakin besar kapasitasnya sehingga kita bisa menggunakan media Flasdisk ini sebagai pengganti CD room . DVD room.
Teknik yang yang saya gunakan ini tidak hanya berguna untuk netbook saja tapi berguna untuk semua komputer yang tidak memiliki cdroom dan sudah support booting dengan Usb Flasdisk.
Alat-alat yang harus di persiapkan :

  1. Usb Flash disk apa aja ( Min 1GB lebih besar lebih bagus).
  2. komputer master , lengkap dengan cd-rom ( untuk membuat master flash disk )
  3. CD installer windows xp.
Software yang diperlukan :
  • USB_PREP8 dan PEtoUSB  ( Sudah saya gabungkan jadi satu)
  • Silakhan di download terlebih dahulu file nya
    winzip Cara Install Windows XP dengan Flashdisk download: USB_PREP8 dan PEtoUSB ()
    added: 12/07/2010
    clicks: 4867
    description: USB_PREP8 dan PEtoUSB
Setelah alat yang diperlukan siap dan software telah didownload langkah berikutnya adalah :
  1. Colokan USB flash disk ke komputer.
  2. Masukan Cd Installer Windows Xp ke dalam CD room.
  3. Extrak file yang sudah di download ke Drive C:/flasdisk
  4. Selanjutnya masuk ke folder C:\flasdisk tadi yang sudah dibuat dan berisi file2 yang di extra diatas.
  5. Selanjutnya jalankan file bernama “usb_prep8.bat” Kemudian akan muncul sebuah windows command prompt berisi bermacam2 perintah tekan sembarang tombol saja untuk melanjutkan.
  6. Kemudian akan muncul program PEtoUSB untuk memformat Flasdisk , Pilih flasdisk yang akan di format kemudian Klik Start sampai selesai.
  7. Jika proses format sudah selesai, tutup program PEtoUSB Kembali lagi ke windows command prompt usb_prep8.bat di layar akan muncul opsi-opsi dari 0 hingga 5.
  8. Selanjutnya pilih Pilihan No 1 untuk memilih sumber file installasi windows pilih Cdroom tempat kita menyimpan CD Installasi Windows xp.
  9. Setelah itu lanjutkan dengan Memilih Pilihan No 3 , untuk mentukan dimana kita mencolokan Usb flash disk , kalau di drive E maka ketik e dan tekan enter.
  10. Setelah tahap ini pilihlah Pilihan No 4 untuk memulai proses pembuatan modul instalasi yang nantinya akan disalin ke dalam USB flash disk secara otomatis. Ketika muncul Popup windows Pilih aja pilihan YES, apa pun konfirmasi yang muncul pilih YESn. Proses ini kira-kira akan memakan waktu sekitar 15 Menit.
  11. Setelah selesai semua langkah diatas dan Usb Flasdisk siap digunakan untuk Installasi Windows XP,
  12. Jangan Lupa ketika mau menginstall dengan Usb Flasdisk ini kita harus masuk dulu ke dalam BIOS komputer dan memilih boot First nya ke Removable drive.
sumber :
http://www.ndroe.web.id/cara-install-windows-xp-dengan-flashdisk.html

30 Software antivirus terbaik 2011 di dunia (best antivirus in the world)

Antivirus terbaik 2011 agak berbeda dibandingkan dengan antivirus terbaik 2010. Jika pada tahun 2010 berdasarkan hasil survey dan pengujian yang dilakukan oleh berbagai perusahaan yang bergerak di bidang review dan pengujian produk teknologi menobatkan Bitdefender sebagai antivirus terbaik 2010. Maka saat ini kedudukan antivirus Bitdefender bergeser ke posisi kedua, digantikan oleh pesaingnya. Antivirus terbaik 2011 adalah Ad-Aware Pro Internet Security 9.0 berdasarkan hasil pengujian dari team teknisi PC Magazine


Penilaian antivirus terbaik 2011 tersebut berdasarkan pada kemudahan penggunaan, kinerja antivirus dalam memproteksi komputer, kecepatan dalam membersihkan virus yang menginfeksi komputer,recovery data yang terinfeksi virus, update antivirus, serta kemampuan melindungi komputer dari serangan virus dan script-script berbahaya lainnya. Berikut ini adalah daftar antivirus terbaik 2011 versi PC Magazine



1. Ad-Aware Pro Internet Security 9.0
2. BitDefender Antivirus Pro 2011
3. BullGuard Antivirus 10
4. Double Anti-Spy Professional v2
5. eScan Anti-Virus 11
6. F-Secure Anti-Virus 2011
7. G Data AntiVirus 2011
8. Kaspersky Anti-Virus 2011
9. McAfee AntiVirus Plus 2011
10. Norton AntiVirus 2011
11. Outpost Antivirus Pro 7.0
12. Panda Antivirus Pro 2011
13. PC Tools Spyware Doctor with AntiVirus 2011
14. StopSign Internet Security 1.0
15. TrustPort Antivirus 2011
16. Trend Micro Titanium Antivirus + 2011
17. Webroot AntiVirus with Spy Sweeper 2011
18. Ad-Aware Free Internet Security 9.0
19. AVG Anti-Virus Free 2011
20. Comodo Antivirus 5.0
21. digital defender free 2.0
22. Immunet Protect Free 2.0
23. Malwarebytes' Anti-Malware 1.46
24. Panda Cloud Antivirus 1.1
25. avast! Free Antivirus 5.0
26. Avira AntiVir Personal 10
27. Microsoft Security Essentials 1.0
28. Prevx 3.0
29. VIPRE Antivirus 4.0
30. ZoneAlarm Antivirus 2010

Silahkan di cek software antivirus di atas mungkin bisa menjadi bahan pertimbangan untuk memilih antivirus yang akan diinstal di komputer, jika ingin membandingkan dengan antivirus terbaik tahun lalu bisa dilihat disini antivirus terbaik 2010

more : http://artikelkomputerku.blogspot.com/2011/02/30-software-antivirus-terbaik-2011-di.html

Computer is...

A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. Complex computers also include the means for storing data (including the program, which is also a form of data) for some necessary duration. A program may be invariable and built into the computer (and called logic circuitry as it is on microprocessors) or different programs may be provided to the computer (loaded into its storage and then started by an administrator or user). Today's computers have both kinds

Learn More

of programming. Most histories of the modern computer begin with the Analytical Engine envisioned by Charles Babbage following the mathematical ideas of George Boole, the mathematician who first stated the principles of logic inherent in today's digital computer. Babbage's assistant and collaborator, Ada Lovelace, is said to have introduced the ideas of program loops and subroutines and is sometimes considered the first programmer. Apart from mechanical calculators, the first really useable computers began with the vacuum tube, accelerated with the invention of the transistor, which then became embedded in large numbers in integrated circuits, ultimately making possible the relatively low-cost personal computer.
Modern computers inherently follow the ideas of the stored program laid out by John von Neumann in 1945. Essentially, the program is read by the computer one instruction at a time, an operation is performed, and the computer then reads in the next instruction, and so on. Recently, computers and programs have been devised that allow multiple programs (and computers) to work on the same problem at the same time in parallel. With the advent of the Internet and higher bandwidth data transmission, programs and data that are part of the same overall project can be distributed over a network and embody the Sun Microsystems slogan: "The network is the computer."

read more :  http://searchwinit.techtarget.com/definition/computer

How To Install Windows XP From A USB Flash Drive

Install Windows XP

Installing Windows XP on the Asus EEE pc using a single USB flash drive.

Please note this tutorial works on all computers not just the Asus EEE PC.
To complete this tutorial you need a 32bit version of Windows XP or Windows Vista installed on your home PC.

What you'll need:
USB_PREP8 (alternative download)
PeToUSB (alternative download)

Bootsect.exe (alternative download)
Special Note: If you use the program Nlite be sure to keep the manual installation files as the USB_prep8 script relies on these files.

Extract the files in Bootsect.zip
The next step is to extract USB_prep8 and PeToUSB.
Next copy the PeToUSB executable into the USB_prep8 folder.
Inside of the USB_prep8 folder double click the executable named usb_prep8.cmd.

The window that opens will look like this:



Press any key to continue

You next window will look like this:
These settings are preconfigured for you all you need to do now is click start.
Once the format is complete DO NOT close the window just leave everything as it is and open a command prompt from your start menu (type cmd in the search bar or run box depending on your version of windows.).

Inside of the command windows go to the directory you have bootsect.exe saved.
(use the cd directoryname command to switch folders)

Now type "bootsect.exe /nt52 R:" NOTE R: is the drive letter for my USB stick if yours is different you need to change it accordingly. What this part does is write the correct boot sector to your USB stick, this allows your PC to boot from the USB stick without it nothing works.
Please note: When running the bootsect.exe command you cannot have any windows open displaying the content of your USB stick, if you have a window open bootsect.exe will be unable to lock the drive and write the bootsector correctly.

If all went well you should see "Bootcode was successfully updated on all targeted volumes."

Now you can close this command prompt (don't close the usbprep8 one by mistake) and the petousb window.

You window you see now should look like this:

If it doesn't try pressing enter.

Now you need to enter the correct information for numbers 1-3.
Press 1 and then enter. A folder browse window will open for you to browse to the location of you XP setup files (aka your cdrom drive with xp cd in)
Press 2 and enter a letter not currently assigned to a drive on your PC
Press 3 and enter the drive letter of your USB stick
Press 4 to start the process.

The script will ask you if its ok to format drive T:. This is just a temp drive the program creates to cache the windows installation files. Press Y then enter.

Once it's done formating press enter to continue again, you can now see the program copying files to the temp drive it created. Once this is done press enter to continue again.

Next you will see a box pop up asking you to copy the files to USB drive yes/no you want to click yes.

Once the script has completed copy files a popup window asking if you would like to USB drive to be preferred boot drive U: select YES on this window.

Now select yes to unmount the virtual drive.

Ok we are done the hard part, close the usbprep8 window.

Now make sure your EEE pc is configured with USB as the primary boot device.
Insert your USB drive and boot up the EEE.

On the startup menu you have two options, select option number 2 for text mode setup.

From this point on it is just like any other windows XP installation delete/recreate the primary partition on your EEE pc and format it using NTFS. Make sure you delete ALL partitions and recreate a single partition or you will get the hal.dll error message.

Once the text mode portion of setup is complete it will boot into the GUI mode (you can press enter after the reboot if your too excited to wait the 30 seconds)

Once the GUI portion of setup is complete you will again have to boot into GUI mode this will complete the XP installation and you will end up at you XP desktop. It is very important that you DO NOT REMOVE THE USB STICK before this point. Once you can see your start menu it is safe to remove the usb stick and reboot your pc to make sure everything worked.

This method has advantages over all current no cdrom methods of installing XP to the EEE. You do not have to copy setup files in DOS to the SSD and install from there. It gives you access to the recovery console by booting into text mode setup, and it gives you the ability to run repair installations of XP if you have problems later on.

I hope this worked out for you and please post feedback to the comments section.
Please note due to the amount of comments this article has received you must now click on "Post a Comment" below the existing comments to view the most recent feedback in a popup window.


more fully in : http://www.eeeguides.com/2007/11/installing-windows-xp-from-usb-thumb.html

Online game???

Definition

"Online gaming is a technology rather than a genre; a mechanism for connecting players together rather than a particular pattern of gameplay."[1] Online games are played over some form of computer network, now typically on the Internet. One advantage of online games is the ability to connect to multiplayer games, although single-player online games are quite common as well.

First-person shooter games

During the 1990s, online games started to move from a wide variety of LAN protocols (such as IPX) and onto the Internet using the TCP/IP protocol. Doom popularized the concept of deathmatch, where multiple players battle each other head-to-head, as a new form of online game. Since Doom, many first-person shooter games contain online components to allow deathmatch or arena style play.

Real-time strategy games

Early real-time strategy games often allowed multiplayer play over a modem or local network. As the Internet started to grow during the 1990s, software was developed that would allow players to tunnel the LAN protocols used by the games over the Internet. By the late 1990s, most RTS games had native Internet support, allowing players from all over the globe to play with each other. Services were created to allow players to be automatically matched against another player wishing to play or lobbies were formed where people could meet in so called game rooms. An example was the MSN Gaming Zone where online game communities were formed by active players for games, such as Age of Empires and Microsoft Ants.

Cross-platform online play

As consoles are becoming more like computers, online gameplay is expanding. Once online games started crowding the market, open source networks, such as the Dreamcast, PlayStation 2, Nintendo GameCube and Xbox took advantage of online functionality with its PC game counterpart. Games such as Phantasy Star Online have private servers that function on multiple consoles. Dreamcast, PC, Macintosh and GameCube players are able to share one server. Earlier games, like 4x4 Evolution, Quake III and Need for Speed: Underground also have a similar function with consoles able to interact with PC users using the same server. Usually, a company like Electronic Arts or Sega runs the servers until it becomes inactive, in which private servers with their own DNS number can function. This form of open source networking has a small advantage over the new generation of Sony and Microsoft consoles which customize their servers to the consumer.

Browser games

As the World Wide Web developed and browsers became more sophisticated, people started creating browser games that used a web browser as a client. Simple single player games were made that could be played using a web browser via HTML and HTML scripting technologies (most commonly JavaScript, ASP, PHP and MySQL). More complicated games such as Legend of Empires or AQWorlds would contact a web server to allow a multiplayer gaming environment.
The development of web-based graphics technologies such as Flash and Java allowed browser games to become more complex. These games, also known by their related technology as "Flash games" or "Java games", became increasingly popular. Many games originally released in the 1980s, such as Pac-Man and Frogger, were recreated as games played using the Flash plugin on a webpage. Most browser games had limited multiplayer play, often being single player games with a high score list shared amongst all players. This has changed considerably in recent years as examples like Castle of Heroes or Canaan Online show.
Browser-based pet games are popular amongst the younger generation of online gamers. These games range from gigantic games with millions of users, such as Neopets, to smaller and more community-based pet games.
More recent browser-based games use web technologies like Ajax to make more complicated multiplayer interactions possible and WebGL to generate hardware-accelerated 3D graphics without the need for plugins.

MUDs

MUDs are a class of multi-user real-time virtual worlds, usually but not exclusively text-based, with a history extending back to the creation of MUD1 by Richard Bartle in 1978. MUDs were the direct predecessors of MMORPGs.[2]

Massively multiplayer online games (MMOG)

Massively multiplayer online games were made possible with the growth of broadband Internet access in many developed countries, using the Internet to allow hundreds of thousands of players to play the same game together. Many different styles of massively multiplayer games are available, such as:
  • MMORPG (Massively multiplayer online role-playing game)
  • MMORTS (Massively multiplayer online real-time strategy)
  • MMOFPS (Massively multiplayer online first-person shooter)
  • MMOSG (Massively multiplayer online social game)

Online game governance

Popular online games are commonly bound by an End User License Agreement (EULA). The consequences of breaking the agreement vary according to the contract; ranging from warnings to termination, such as in the 3D immersive world Second Life where a breach of contract will append the player warnings, suspension and termination depending on the offense.[3] Enforcing the EULA is difficult, due to high economic costs of human intervention and low returns back to the firm. Only in large scale games is it profitable for the firm to enforce its EULA.
Edward Castronova writes that "there are issues of ownership and governance that wrinkle the affairs of state significantly".[4] He has divided the online governance into "good governance" and "strange governance". Castronova also mentions that synthetic worlds are good ways to test for government and management.

Read More :  http://en.wikipedia.org/wiki/Online_game

stop: 0x00000050 BSOD (Blue Screen Of Dead)

stop: 0x00000050
BSOD (Blue Screen Of Dead)
Computer restarts itself and appears a blue screen after restart.
BSOD This code means that the damage to the hardware that is commonly referred to MEMORY or RAM, so the solution instead of RAM or check your ram first on another computer is good. The cause of this may be due because the computer working too hard or not good quality ram.
so that this problem was getting ready to replace your ram .....

Computer virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.[2]
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

read more :  http://en.wikipedia.org/wiki/Computer_virus

what is BSOD(Blue Screen Of Dead)?

What is the Blue Screen of Death?
The Blue Screen of Death, or simply BSOD, represents an error notoriously associated with Microsoft Windows operating systems. This error is more common on older versions of Windows such as 3.0 and 3.1, but also shows up on later versions such as Windows 95, 98, NT, 2000, XP, and even Vista. Although the Windows platform has come a long way in terms of stability and performance, the infamous Blue Screen of Death is still known to make an entrance from time to time. When this nuisance shows up, it often indicates that the system has a critical error.

Identifying the Blue Screen of Death
As the name implies, the Blue Screen of Death is characterized by a blue screen along with text and hexadecimal values that help to determine what caused the problem. When a BSOD occurs, the system is essentially shutting down to protect itself from a particular error. Unfortunately, it often leads to the loss of any data that was not saved before the computer crash occurred.
After encountering the Blue Screen of Death, your computer might automatically shut down or you may be forced to shut it down manually. Once this process is complete, the machine is rebooted and the system typically runs a diagnostics to retrieve data and determine what led to the error.
If you are bombarded with a BSOD error repeatedly, it could be a sign that your computer system is enduring serious problems. When this is the case, you may need to perform a re installation of the operating system or take various troubleshooting steps in order to pinpoint and resolve the issue. Some of these steps may need to be performed in Safe Mode, which provides a stripped down version of the Windows operating system and features an environment that lets you safely troubleshoot various issues.
Analyzing BSOD Codes
Unless you are a computer programmer, the data that is displayed on the blue screen will probably look like unfamiliar gibberish. However, this information is incredibly useful in solving your problems. These codes generally identify the error and its parameters among other details that could help you pinpoint the problem and keep it from occurring again. A knowledgeable computer user can access the information accompanying the Blue Screen of Death and quickly determine the root of the problem. Most of the time, they come to find that it has something to do with the kernel of the operating system, or a hardware device installed on the computer.
Inherent Problems with Computer Systems
Unless you started your computing with newer versions of XP or Vista, you have probably encountered the dreaded Blue Screen of Death with more frequency then you prefer. This is especially true for someone running a more unstable version of the system or one who has made significant modifications to the Windows environment. Although the Windows system has been known for the infamous blue screen and other deficiencies, it isn’t the only platform that endures critical errors. Both Mac OS X and Linux computers encounter similar problems known as Kernel Attacks.

RAM

Memori akses acak (bahasa Inggris: Random access memory, RAM) adalah sebuah tipe penyimpanan komputer yang isinya dapat diakses dalam waktu yang tetap tidak memperdulikan letak data tersebut dalam memori. Ini berlawanan dengan alat memori urut, seperti tape magnetik, disk dan drum, di mana gerakan mekanikal dari media penyimpanan memaksa komputer untuk mengakses data secara berurutan.
Pertama kali dikenal pada tahun 60'an. Hanya saja saat itu memori semikonduktor belumlah populer karena harganya yang sangat mahal. Saat itu lebih lazim untuk menggunakan memori utama magnetic.
Perusahaan semikonduktor seperti Intel memulai debutnya dengan memproduksi RAM , lebih tepatnya jenis DRAM.
Biasanya RAM dapat ditulis dan dibaca, berlawanan dengan memori-baca-saja (read-only-memory, ROM), RAM biasanya digunakan untuk penyimpanan primer (memori utama) dalam komputer untuk digunakan dan mengubah informasi secara aktif, meskipun beberapa alat menggunakan beberapa jenis RAM untuk menyediakan penyimpanan sekunder jangka-panjang.
Tetapi ada juga yang berpendapat bahwa ROM merupakan jenis lain dari RAM, karena sifatnya yang sebenarnya juga Random Access seperti halnya SRAM ataupun DRAM. Hanya saja memang proses penulisan pada ROM membutuhkan proses khusus yang tidak semudah dan fleksibel seperti halnya pada SRAM atau DRAM. Selain itu beberapa bagian dari space addres RAM ( memori utama ) dari sebuah sistem yang dipetakan kedalam satu atau dua chip ROM.

sumber : http://id.wikipedia.org/wiki/RAM

ALU (Arithmetic ligic Unit)

Tasks of an ALU

ALU units typically need to be able to perform the basic logical operations (AND, OR), including the addition operation. The inclusion of inverters on the inputs enables the same ALU hardware to perform the subtraction operation (adding an inverted operand), and the operations NAND and NOR.
A basic ALU design involves a collection of "ALU Slices", which each can perform the specified operation on a single bit. There is one ALU slice for every bit in the operand.

[edit] ALU Slice

[edit] Example: 2-Bit ALU

This is an example of a basic 2-bit ALU. The boxes on the right hand side of the image are multiplexers and are used to select between various operations: OR, AND, XOR, and addition.
2-bit ALU.png
Notice that all the operations are performed in parallel, and the select signal ("OP") is used to determine which result to pass on to the rest of the datapath. Notice that the carry signal, which is only used for addition, is generated and passed out of the ALU for every operation, so it is important that if we aren't performing addition that we ignore the carry flag.

[edit] Example: 4-Bit ALU

Here is a circuit diagram of a 4 bit ALU.
74181aluschematic.png

[edit] Additional Operations

Logic and addition are some of the easiest, but also the most common operations. For this reason, typical ALUs are designed to handle these operations specially, and other operations, such as multiplication and division, are handled in a separate module.
Notice also that the ALU units that we are discussing here are only for integer datatypes, not floating-point data. Luckily, once integer ALU and multiplier units have been designed, those units can be used to create floating-point units (FPU).

[edit] ALU Configurations

Once an ALU is designed, we need to define how it interacts with the rest of the processor. We can choose any one of a number of different configurations, all with advantages and disadvantages. Each category of instruction set architecture (ISA) -- stack, accumulator, register-memory, or register-register-load-store -- requires a different way of connecting the ALU. [1] In all images below, the orange represents memory structures internal to the CPU (registers), and the purple represents external memory (RAM).


[edit] Accumulator

Isaccumulator.png
An accumulator machine has one special register, called the accumulator. The accumulator stores the result of every ALU operation, and is also one of the operands to every instruction. This means that our ISA can be less complicated, because instructions only need to specify one operand, instead of two operands and a destination. Accumulator architectures have simple ISAs and are typically very fast, but additional software needs to be written to load the accumulator with proper values. Unfortunately, accumulator machines are difficult to pipeline.
One example of a type of computer system that is likely to use an accumulator is a common desk calculator.

[edit] Register-to-Register

Isreg2reg.png
One of the more common architectures is a Register-to-register architecture, also called a 3 register operand machine. In this configuration, the programmer can specify both source operands, and a destination register. Unfortunately, the ISA needs to be expanded to include fields for both source operands and the destination operands. This requires longer instruction word lengths, and it also requires additional effort (compared to the accumulator) to write results back to the register file after execution. This write-back step can cause synchronization issues in pipelined processors (we will discuss pipelining later).

[edit] Register Stack

Is0addr.png
A register stack is like a combination of the Register-to-Register and the accumulator structures. In a register stack, the ALU reads the operands from the top of the stack, and the result is pushed onto the top of the stack. Complicated mathematical operations require decomposition into Reverse-Polish form, which can be difficult for programmers to use. However, many computer language compilers can produce reverse-polish notation easily because of the use of binary trees to represent instructions internally. Also, hardware needs to be created to implement the register stack, including PUSH and POP operations, in addition to hardware to detect and handle stack errors (pushing on a full stack, or popping an empty stack).
The benefit comes from a highly simplified ISA. These machines are called "0-operand" or "zero address machines" because operands don't need to be specified, because all operations act on specified stack locations.
In the diagram at right, "SP" is the pointer to the top of the stack. This is just one way to implement a stack structure, although it might be one of the easiest.

[edit] Register-and-Memory

Isregmem.png
One complicated structure is a Register-and-Memory structure, like that shown at right. In this structure, one operand comes from a register file, and the other comes from external memory. In this structure, the ISA is complicated because each instruction word needs to be able to store a complete memory address, which can be very long. In practice, this scheme is not used directly, but is typically integrated into another scheme, such as a Register-to-Register scheme, for flexibility.
Some CISC architectures have the option of specifying one of the operands to an instruction as a memory address, although they are typically specified as a register address.

[edit] Complicated Structures

There are a number of other structures available, some of which are novel, and others are combinations of the types listed above. It is up to the designer to decide exactly how to structure the microprocessor, and feed data into the ALU.

[edit] Example: IA-32

The Intel IA-32 ISA (x86 processors) use a register stack architecture for the floating point unit, but it uses a modified Register-to-Register structure for integer operations. All integer operations can specify a register as the first operand, and a register or memory location as the second operand. The first operand acts as an accumulator, so that the result is stored in the first operand register. The downside to this is that the instruction words are not uniform in length, which means that the instruction fetch and decode modules of the processor need to be very complex.
A typical IA-32 instruction is written as:
ADD AX, BX
Where AX and BX are the names of the registers. The resulting equation produces AX = AX + BX, so the result is stored back into AX.

[edit] Example: MIPS

MIPS uses a Register-to-Register structure. Each operation can specify two register operands, and a third destination register. The downside is that memory reads need to be made in separate operations, and the small format of the instruction words means that space is at a premium, and some tasks are difficult to perform.
An example of a MIPS instruction is:
ADD R1, R2, R3
Where R1, R2 and R3 are the names of registers. The resulting equation looks like: R1 = R2 + R3.

source of : http://en.wikibooks.org/wiki/Microprocessor_Design/ALU