What is the value of the given twos complement number

Assignment Help Computer Engineering
Reference no: EM131320302

Assignment

1. Cloud Applications are run on some web application server in the internet.

2. Multithreading computer Architectures implement the CPU in such a way that more than one instruction can be performed (completed) at a time

3. In a symmetric multiprocessing system there are multiple processors that share other all other system resources (memory, disk, etc).

4. What is the value of the following signed integer 1011 1001 = -27 or -57

5. Direct Memory Access is the most common method of transferring data directly between a peripheral and system RAM.

6. An instruction that only the operating system can execute is called a machine instruction.

7. What is the value of the following 2's complement number?

1111 1111 1111 1011 = -5 or -10

8. What technique is being utilized when high performance is obtained by subdividing the clock cycle into a number of sub-intervals Pipelining technique.

9. When a computer starts up, it begins to load information from the hard disk into its read only memory?

10. Who was the scientist who conceived the concept of a stored programmed control computer? John von Neumann who introduced the von Neumann architecture

11. Express the base 10 number < 2010 > as a base 3 number = 202.

12. Only seven bits are needed to encode the complete ASCII character set. What is the 8th bit used for when encoding the ASCII symbol < @ > into an 8 bit word? =2^8

13. In a monochrome bitmap how many bits are needed to stored the color of a pixel. One bit (black and white)

14. What type of compression algorithm is used when creating a JPEG image? Lossless compression algorithm or lossy

15. What is value of the 1's complement integer 1001 1001? = 0110 0110

16. There are usually four stages in an instruction cycle. Name the first stage. Fetch the instruction stage.

17. File descriptors are an index into a file-descriptor table stored by the Kernel.

18. In lossless data compression, the original amount of data is preserved

19. The elementary component of a Quantum computer is a computer memory

20. What type of data formatting is used in the image below?

712_Vector Image Formatting.jpg
Vector image formatting

21. If you have a true color display using 8 bits for the intensity of each primary color. How many colors can you create for the display? 256 colors.

22. Encode -3 ¾ as a 32 bit IEEE binary number?

1 10000000 11100000000000000000000

23. Encode the symbol for < 5 > in binary so it can be printed on the console screen? = 101

24. Convert the Octal number 238 to a HEX number (D 16)

25. The Inter process communication is an in-memory buffer that connects two processes together.

Reference no: EM131320302

Questions Cloud

Christian teachings to their traditional beliefs : How did some Indian religious leaders add certain Christian teachings to their traditional beliefs?
Information about the native societies of islands : Do these excerpts from Columbus' log provide us with any useful information about the native societies of these islands?  For example, what?  Cite specific evidence.  (A copy of the text will be provided for you.)
Prepare a list of threat categories : Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan
Special characteristics of hellenistic cities : What was the Hellenistic age and how did it come to be? What are some special characteristics of Hellenistic cities, art, culture, thought, and achievements? What were some of the major contributions of the Hellenistic age that outlasted the Helle..
What is the value of the given twos complement number : What is the value of the following 2's complement number? What technique is being utilized when high performance is obtained by subdividing the clock cycle into a number of sub-intervals Pipelining technique.
Special characteristics of hellenistic cities : What was the Hellenistic age and how did it come to be? What are some special characteristics of Hellenistic cities, art, culture, thought, and achievements? What were some of the major contributions of the Hellenistic age that outlasted the Helle..
What is the difference between scanning and cold feeding : Why are the physicians not able to send a medication order to the hospital from their eprescribing device? What is the difference between scanning, COLD feeding, and point-of-care (POC) data entry
American foreign policy up to that time : Describe Secretary of State John Quincy Adams's Address to Congress, July 4, 1821. As a statement of American Foreign Policy, what does it assert? Do you think it accurately reflects American Foreign Policy up to that time? Explain.
Prove the superiority of the new product to the farmer : Perform the test as it should have been done and find if you come to a different conclusion - Explain why the results were different and why your test was a stronger and more reliable test.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd