Modules / Lectures
Module NameDownload
noc20_cs34_assigment_1noc20_cs34_assigment_1
noc20_cs34_assigment_10noc20_cs34_assigment_10
noc20_cs34_assigment_11noc20_cs34_assigment_11
noc20_cs34_assigment_12noc20_cs34_assigment_12
noc20_cs34_assigment_13noc20_cs34_assigment_13
noc20_cs34_assigment_2noc20_cs34_assigment_2
noc20_cs34_assigment_3noc20_cs34_assigment_3
noc20_cs34_assigment_4noc20_cs34_assigment_4
noc20_cs34_assigment_5noc20_cs34_assigment_5
noc20_cs34_assigment_6noc20_cs34_assigment_6
noc20_cs34_assigment_7noc20_cs34_assigment_7
noc20_cs34_assigment_8noc20_cs34_assigment_8
noc20_cs34_assigment_9noc20_cs34_assigment_9


Sl.No Chapter Name MP4 Download
1Module 1.1: Introduction to the CourseDownload
2Module 1.2: CMOS Transistors and GatesDownload
3Module 1.3: Basic GatesDownload
4Module 1.4: Building Gates Using SimulatorDownload
5Module 1.5: Hierarchical Design and VerificationDownload
6Module 1.6: Building Blocks of a Digital ComputerDownload
7Module 2.1: Binary Number SystemsDownload
8Module 2.2: Signed Number SystemsDownload
9Module 2.3: Two’s Complement Number SystemDownload
10Module 2.4: Binary Adder CircuitsDownload
11Module 2.5: Building the ALU of HACKDownload
12Module 2.6: HACK ALU FunctionalityDownload
13Module P1: Tips for Project P01Download
14Module 3.1: Sequential Logic DesignDownload
15Module 3.2: Latches and FlipflopsDownload
16Module 3.3: The Memory HierarchyDownload
17Module 3.4: Design of Program CounterDownload
18Module 3.5: Introduction to Computer Organization: The HACK Instruction Set Architecture (ISA)Download
19Module 3.6 Memory Mapped I/ODownload
20Module P2: Tips for Projects P02 and P03Download
21Module P3: Tips for Project 04Download
22Module P4: Tips for Project 04Download
23Introduction to Computer ArchitectureDownload
24The HACK MicroarchitectureDownload
25The HACK CPU - A Deep Dive: Part 1Download
26The HACK CPU - A Deep Dive: Part 2Download
27The Data MemoryDownload
28The HACK ComputerDownload
29The Assembler ConstructionDownload
30Understanding the Working of AssemblerDownload
31Assembler: Symbol Table ConstructionDownload
32Assembler: Pass 1Download
33Assembler: Pass 2Download
34Project 06 - DemonstrationDownload
35Virtual Machines - What and Why?Download
36The VM Instruction Set ArchitectureDownload
37The execution of a VM ProgramDownload
38How powerful is the VM?Download
39Project 07: VM ISA to HACK Mnemonic TranslationDownload
40Project 07: DemoDownload
41Deep Understanding of VM ISA using VM EmulatorDownload
42Virtual Machine II - Program flow commands and Introduction to Function CallsDownload
43Implementation of Function CallDownload
44Working of the Virtual MachineDownload
45Project 08: Translation of Program Flow and Function Call to HACK MnemonicDownload
46Handling Static VariablesDownload
47Project 08: Implementation tips in a Nut ShellDownload
48Introduction to The JACK Programming LanguageDownload
49Project 09: Basic StepsDownload
50Understanding Syntax of JACK using ExamplesDownload
51Project 09: More ExamplesDownload
52The JACK Syntax - Language SpecificationDownload
53Application Development using JACKDownload
54JACK Compiler: Lexical Analysis - TokenizationDownload
55Project 10: Compiler for JACK - Part-1 DemoDownload
56The JACK GrammarDownload
57Compiler for JACK: Parsing the JACK ProgramDownload
58The Token AnalyzerDownload
59Testing the Correctness Download
60The Jack Compiler - Back-end IntroductionDownload
61The Jack Compiler - Handling VariablesDownload
62The Jack Compiler - Handling ExpressionsDownload
63The Jack Compiler - Handling Flow of ControlDownload
64The Jack Compiler - Handling ObjectsDownload
65The Jack Compiler - Handling ArraysDownload
66The Jack Compiler Backend: An XML guided approachDownload
67The Jack Compiler Backend: Populating the Class and Subroutine Symbol tables.Download
68The Jack Compiler Backend: Code Generation - 1Download
69The Jack Compiler Backend: Code Generation - 2Download
70The Jack Compiler Backend: Code Generation - 3Download
71The Jack Compiler Backend: Code Generation - 4Download
72Jack Compiler: Code Generation - 5Download
73Jack Compiler: Code Generation - 6Download
74Jack Compiler: Code Generation - 7Download
75Understand the Operating System - Compiler InteractionsDownload
76Project - 12: One sample journey from Jack to HackDownload
77Concluding RemarksDownload

Sl.No Chapter Name English
1Module 1.1: Introduction to the CourseDownload
Verified
2Module 1.2: CMOS Transistors and GatesDownload
Verified
3Module 1.3: Basic GatesDownload
Verified
4Module 1.4: Building Gates Using SimulatorDownload
Verified
5Module 1.5: Hierarchical Design and VerificationDownload
Verified
6Module 1.6: Building Blocks of a Digital ComputerDownload
Verified
7Module 2.1: Binary Number SystemsDownload
Verified
8Module 2.2: Signed Number SystemsDownload
Verified
9Module 2.3: Two’s Complement Number SystemDownload
Verified
10Module 2.4: Binary Adder CircuitsDownload
Verified
11Module 2.5: Building the ALU of HACKDownload
Verified
12Module 2.6: HACK ALU FunctionalityDownload
Verified
13Module P1: Tips for Project P01Download
Verified
14Module 3.1: Sequential Logic DesignDownload
Verified
15Module 3.2: Latches and FlipflopsDownload
Verified
16Module 3.3: The Memory HierarchyDownload
Verified
17Module 3.4: Design of Program CounterDownload
Verified
18Module 3.5: Introduction to Computer Organization: The HACK Instruction Set Architecture (ISA)Download
Verified
19Module 3.6 Memory Mapped I/ODownload
Verified
20Module P2: Tips for Projects P02 and P03Download
Verified
21Module P3: Tips for Project 04Download
Verified
22Module P4: Tips for Project 04Download
Verified
23Introduction to Computer ArchitectureDownload
Verified
24The HACK MicroarchitectureDownload
Verified
25The HACK CPU - A Deep Dive: Part 1Download
Verified
26The HACK CPU - A Deep Dive: Part 2Download
Verified
27The Data MemoryDownload
Verified
28The HACK ComputerDownload
Verified
29The Assembler ConstructionDownload
Verified
30Understanding the Working of AssemblerDownload
Verified
31Assembler: Symbol Table ConstructionDownload
Verified
32Assembler: Pass 1Download
Verified
33Assembler: Pass 2Download
Verified
34Project 06 - DemonstrationDownload
Verified
35Virtual Machines - What and Why?Download
Verified
36The VM Instruction Set ArchitectureDownload
Verified
37The execution of a VM ProgramDownload
Verified
38How powerful is the VM?Download
Verified
39Project 07: VM ISA to HACK Mnemonic TranslationDownload
Verified
40Project 07: DemoDownload
Verified
41Deep Understanding of VM ISA using VM EmulatorDownload
Verified
42Virtual Machine II - Program flow commands and Introduction to Function CallsDownload
Verified
43Implementation of Function CallDownload
Verified
44Working of the Virtual MachineDownload
Verified
45Project 08: Translation of Program Flow and Function Call to HACK MnemonicDownload
Verified
46Handling Static VariablesDownload
Verified
47Project 08: Implementation tips in a Nut ShellDownload
Verified
48Introduction to The JACK Programming LanguageDownload
Verified
49Project 09: Basic StepsDownload
Verified
50Understanding Syntax of JACK using ExamplesDownload
Verified
51Project 09: More ExamplesDownload
Verified
52The JACK Syntax - Language SpecificationDownload
Verified
53Application Development using JACKDownload
Verified
54JACK Compiler: Lexical Analysis - TokenizationDownload
Verified
55Project 10: Compiler for JACK - Part-1 DemoPDF unavailable
56The JACK GrammarPDF unavailable
57Compiler for JACK: Parsing the JACK ProgramPDF unavailable
58The Token AnalyzerPDF unavailable
59Testing the Correctness PDF unavailable
60The Jack Compiler - Back-end IntroductionDownload
Verified
61The Jack Compiler - Handling VariablesDownload
Verified
62The Jack Compiler - Handling ExpressionsPDF unavailable
63The Jack Compiler - Handling Flow of ControlPDF unavailable
64The Jack Compiler - Handling ObjectsPDF unavailable
65The Jack Compiler - Handling ArraysPDF unavailable
66The Jack Compiler Backend: An XML guided approachDownload
Verified
67The Jack Compiler Backend: Populating the Class and Subroutine Symbol tables.Download
Verified
68The Jack Compiler Backend: Code Generation - 1Download
Verified
69The Jack Compiler Backend: Code Generation - 2Download
Verified
70The Jack Compiler Backend: Code Generation - 3Download
Verified
71The Jack Compiler Backend: Code Generation - 4Download
Verified
72Jack Compiler: Code Generation - 5Download
Verified
73Jack Compiler: Code Generation - 6Download
Verified
74Jack Compiler: Code Generation - 7Download
Verified
75Understand the Operating System - Compiler InteractionsDownload
Verified
76Project - 12: One sample journey from Jack to HackDownload
Verified
77Concluding RemarksDownload
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available