Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Compact Disk Read Only Memory?
This technology has evolved out of entertainment electronics market where cassette tapes and long playing records are being replaced by CDs. Term CD used for audio records stands for Compact Disk. Disks used for data storage in digital computers are called as CD-ROM whose diameter is 5.25 inches. It can store around 650MB. Information in CD-ROM is written by creating pits on disk surface by shining a laser beam. As disk rotates laser beam traces out a continuous spiral. Focused beam makes a circular pit of around 0.8-micrometer diameter wherever a 1 is to be written and no pits (also known as a land) if a 0 is to be written. Figure below displays CD-ROM and DVD-ROM.
CD-ROM with pre-recorded information is read by CD-ROM reader which employs a laser beam for reading. It is rotated by a motor at a speed of 360 RPM. A laser head moves in and out to specified position. As disk rotates the head senses pits and land. This is converted to 1s and 0s by electronic interface and sent to computer. Disk speed of CD-ROM is denoted by notation nx where n is an integer denoting the factor by that original speed of 150KB/s is to be multiplied. It is associated to a computer by IDE and SCSI interfaces. The main application of CD-ROM is in distributing large text, audio and video. For illustration the whole Encyclopaedia could be stored in one CD-ROM. A 640MB CD-ROM can store 74 minutes of music.
Formal Analysis: The second step of the art critiquing process often begins with an analysis of the artworks formal elements and how they are the organised. The formal elem
What is recursing downwards? And its ways. The design process generally works top-down; you start with the higher level operations and proceed to describe lower level operation
In a 10000 line exchange, 0000 to 2999 is allotted to x group of subscribers, out of which 40% are active during busy hour. The remaining numbers are domestic numbers out of which
Q. Show the Hypothetical Instruction Format of 32 bits? A sample instruction format is shown in figure below. Figure: A Hypothetical Instruction Format of 32 bits
Explain the Executing Requests Using a Message-Passing Architecture Executing requests using a message-passing architecture requires good fundamental client-server programming
Q. Basic Tradeoff of concerns for instruction set design? Basic Tradeoff: Smaller instruction (less space) vs. desire for more powerful instruction repertoire. Generally p
How is it possible to make a module 2 n counter using N-flipflops? Name the two types of such counters. Ans: Module 2 n counter counts total 2 n distinguishable states w
WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i wrongly gets the n
Translate the following sentences into predicate logic, using identity (=). a. Everyone was drunk except John. b. Christine rides a bike, but everyone else drives a car. c
Main Objectives: Uploading codes into the microcontrollers Interfacing between both microcontrollers via I 2 C Reading and writing into various ports on the MCU Int
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd