{"id":6852,"date":"2025-10-17T09:46:15","date_gmt":"2025-10-17T06:46:15","guid":{"rendered":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852"},"modified":"2025-10-17T09:46:16","modified_gmt":"2025-10-17T06:46:16","slug":"computer-architecture-course-lectures","status":"publish","type":"post","link":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en","title":{"rendered":"Computer Architecture Course Lectures"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p><\/p>\n<figure class=\"wp-block-table\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">The Lecture<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">Link<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">First<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/wp-content\/uploads\/sites\/26\/2025\/01\/\u0645\u062d\u0627\u0636\u0631\u0629-1-\u0645\u0639\u0645\u0627\u0631\u064a\u0629.pdf\">introduction<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Second<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/wp-content\/uploads\/sites\/26\/2025\/01\/\u0645\u062d\u0627\u0636\u0631\u06292-\u0645\u0639\u0645\u0627\u0631\u064a\u0629memory.pdf\">memory<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Third<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/wp-content\/uploads\/sites\/26\/2025\/01\/\u0645\u062d\u0627\u0636\u0631\u0629-3-\u0645\u0639\u0645\u0627\u0631\u064a\u0629memory-devices-characteristic.pdf\">memory devices characteristic<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Fourth<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/wp-content\/uploads\/sites\/26\/2025\/01\/\u0645\u062d\u0627\u0636\u0631\u0629-4-ram-orginization1dimension.pdf\">ram orginization 1 dimension<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Fifth<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/wp-content\/uploads\/sites\/26\/2025\/01\/ram-orginization-2-dimension-\u0645\u062d\u0627\u0636\u0631\u0629-5.pdf\">ram orginization 2- dimension<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>The Lecture Link First introduction Second memory Third memory devices characteristic Fourth ram orginization 1 dimension Fifth ram orginization 2- dimension<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[120],"tags":[],"class_list":["post-6852","post","type-post","status-publish","format-standard","hentry","category-third-stage-lectures"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\" \/>\n<meta property=\"og:description\" content=\"The Lecture Link First introduction Second memory Third memory devices characteristic Fourth ram orginization 1 dimension Fifth ram orginization 2- dimension\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&amp;lang=en\" \/>\n<meta property=\"og:site_name\" content=\"\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-17T06:46:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T06:46:16+00:00\" \/>\n<meta name=\"author\" content=\"admin16\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin16\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en\"},\"author\":{\"name\":\"admin16\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/#\\\/schema\\\/person\\\/f9ca2548ab51656ab27e18d7c1a7df8b\"},\"headline\":\"Computer Architecture Course Lectures\",\"datePublished\":\"2025-10-17T06:46:15+00:00\",\"dateModified\":\"2025-10-17T06:46:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en\"},\"wordCount\":125,\"commentCount\":0,\"articleSection\":[\"Third Stage Lectures\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en\",\"url\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en\",\"name\":\"Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/#website\"},\"datePublished\":\"2025-10-17T06:46:15+00:00\",\"dateModified\":\"2025-10-17T06:46:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/#\\\/schema\\\/person\\\/f9ca2548ab51656ab27e18d7c1a7df8b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?p=6852&lang=en#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629\",\"item\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Architecture Course Lectures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/#website\",\"url\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/\",\"name\":\"\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/#\\\/schema\\\/person\\\/f9ca2548ab51656ab27e18d7c1a7df8b\",\"name\":\"admin16\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g\",\"caption\":\"admin16\"},\"url\":\"https:\\\/\\\/eps.uohamdaniya.edu.iq\\\/computerscience\\\/?author=34\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en","og_locale":"ar_AR","og_type":"article","og_title":"Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628","og_description":"The Lecture Link First introduction Second memory Third memory devices characteristic Fourth ram orginization 1 dimension Fifth ram orginization 2- dimension","og_url":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en","og_site_name":"\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628","article_published_time":"2025-10-17T06:46:15+00:00","article_modified_time":"2025-10-17T06:46:16+00:00","author":"admin16","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"admin16","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en#article","isPartOf":{"@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en"},"author":{"name":"admin16","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/#\/schema\/person\/f9ca2548ab51656ab27e18d7c1a7df8b"},"headline":"Computer Architecture Course Lectures","datePublished":"2025-10-17T06:46:15+00:00","dateModified":"2025-10-17T06:46:16+00:00","mainEntityOfPage":{"@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en"},"wordCount":125,"commentCount":0,"articleSection":["Third Stage Lectures"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en","url":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en","name":"Computer Architecture Course Lectures - \u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628","isPartOf":{"@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/#website"},"datePublished":"2025-10-17T06:46:15+00:00","dateModified":"2025-10-17T06:46:16+00:00","author":{"@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/#\/schema\/person\/f9ca2548ab51656ab27e18d7c1a7df8b"},"breadcrumb":{"@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?p=6852&lang=en#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629","item":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/"},{"@type":"ListItem","position":2,"name":"Computer Architecture Course Lectures"}]},{"@type":"WebSite","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/#website","url":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/","name":"\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/#\/schema\/person\/f9ca2548ab51656ab27e18d7c1a7df8b","name":"admin16","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/secure.gravatar.com\/avatar\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2366b8471ec5dfbb3739dcd8151944ac6261e6e283a8003086c7a022534c609?s=96&d=mm&r=g","caption":"admin16"},"url":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/?author=34"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/posts\/6852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6852"}],"version-history":[{"count":2,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/posts\/6852\/revisions"}],"predecessor-version":[{"id":6855,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=\/wp\/v2\/posts\/6852\/revisions\/6855"}],"wp:attachment":[{"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eps.uohamdaniya.edu.iq\/computerscience\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}