What is the relationship between ram and the cpu

Assignment Help Basic Computer Science
Reference no: EM13872201

1. List and describe at least three factors that distinguish storage devices.

2. What is the relationship between RAM and the CPU?

3. What is the role of primary memory in computer system? Be specific.

4. What is the difference between RAM and secondary storage?

5. Describe how RAM is used from computer system startup to shut down.

6. List and describe at least three types of storage that is typically included in all computer systems.

7. What is the difference between cache and conventional memory?

8. What is the fastest type of storage, how fast does it work, and where is located?

9. Describe three factors that determine the size of RAM?

10. List and describe at least two commonly used approaches to improve memory performance.

11. What is the difference between buses and channels?

12. List and describe the various types of buses.

13. What is the purpose of virtual memory and why is it important in today's computer system environments?

14. Explain the difference between the line bus for RAM and ROM.

15. List and define the various classifications of instructions.

16. What is considered to be a major weakness of RAM? Why is it important that users fully understand this weakness?

17. Explain the concepts of read and write as it relates to RAM.

18. What are the two main factors that determine the size of ROM?

19. What are some typical steps that can be used to improve the overall performance of computer system?

20. What is the difference of between MAR (Memory Address Register) and MDR (Memory Data Register)? Where are these components located?

Reference no: EM13872201

Questions Cloud

Trend reports on the topic information technology : Write five trend reports on the topic Information Technology & business starting with January-December 2015 (nothing earlier) in hard (paper) and soft (electronic file)
Prepare journal entry that should be recorded as of december : For each of the situations above, prepare the journal entry that should be recorded as of December 31, 2014, or explain why an entry should not be recorded. Show supporting computations in good form.
Determining the pressure in atmospheres : Hydraulic Lift II The piston of a hydraulic automobile lift is 0.30 m in diameter. What gauge pressure, in Pascal's, is required to lift a car with a mass of 1200 kg? Also express this pressure in atmospheres.
Determining the pressure in atmospheres : Hydraulic Lift II The piston of a hydraulic automobile lift is 0.30 m in diameter. What gauge pressure, in Pascal's, is required to lift a car with a mass of 1200 kg? Also express this pressure in atmospheres.
What is the relationship between ram and the cpu : List and describe at least three factors that distinguish storage devices. What is the relationship between RAM and the CPU? What is the role of primary memory in computer system? Be specific. What is the difference between RAM and secondary storage
Hole at the bottom of a very wide : How fast does water flow from a hole at the bottom of a very wide, 4.6-m-deep storage tank filled with water? Ignore viscosity.
Growth rate of share of common stocks dividends : If the expected constant growth rate of a share of common stock's dividends and per share price decreases, then according to the discounted cash flow approach to valuation, the price of the stock should:
Exhibiting a million-dollar cube of gold : Gold Brick you win the lottery and decide to impress your friends by exhibiting a million-dollar cube of gold. At the time, gold is selling for $426.60 per troy ounce, and 1.0000 troy ounces equals 31.1035 g. How tall would your million-dollar cub..
What are your cultural relationships : How would you describe your cultural (both intercultural and complementary) relationships and What works well and what challenges do you experience?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Best practices for network security

Need an orgianal paper over one of the followingProtecting IT: A Roadmap for Securing the Enterprise•Best Practices for Network Security

  Reverse the string

Reverse the string. If the reversed string is the same (.equals()) as the original, pared down, string then it is a palindrome.Way 2: Look at the first and last letter and see if they are the same (using the charAt() method), then the second letter ..

  Describe the biggest challenge to the successful

Analyze the benefits of use-case modeling and isolate the most advantageous benefit to the firm you currently work or worked in the past and state why.Describe the biggest challenge to the successful use of use-case modeling and recommend how to over..

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns?

  Solve reasoning problem

If Abby is communicating, so is Randy. Vijay and Kevin are either both communicating or neither is. If Heather is communicating, then so are Abby and Kevin. Describe your reasoning.

  The president is doing a good job

Add formats for Age (0-30, 31-50, 51-70, 71+), Party (D = Democrat, R = Republican), and Ques1-Ques4 (1=Strongly Disagree, 2=Disagree, 3=No Opinion, 4=Agree, 5=Strongly Agree)

  Review the car-caravan analogy

Review the car-caravan analogy

  Design a program to perform the task

Calculate the total price based on several key parts required to build a state-of-the-art gaming computer. The user will have the option of selecting different parts. For example, Windows 7, Windows 8 or Mac OS/X for Operating systems, 4 GB, 8 GB or ..

  Use a computer in his daily school and work activities

Simon is a new foreign exchange student who has never used a personal computer. He will need help understanding how to use a computer in his daily school and work activities.

  Add the following numbers in two''s complements

Given four bits, add the following numbers in two's complements. a. - 4 + (- 1), b. -7 + 3, c. -5 + 4

  What is a value chain

What is a value chain? Distinguish between primary and secondary components and provide some examples

  Describe multi-factor multiple means of authentication of a

question 1. explain multi-factor multiple means of authentication of a user and give two examples for each

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd