Describe the difference between cache and virtual memory, Computer Engineering

Assignment Help:

Question 1:

(a) What do you meant by an expert system?

(b) Describe benefits of the EDI.

(c) Describe what you understand by:
(i) File Infectors
(ii) Boot Sector Viruses
(iii) Macro Viruses

(d) Mention steps in reducing infection risks for your PC.

(e) Mention two problems spam create for a computer user.

(f) Show the different phases of the Information System Life Cycle.

Question 2:

(a) Differentiate between system software and application software.

(b) List types of RAM

(c) List types of ROM

(d) Describe the difference between Cache Memory and Virtual Memory.

(e) Describe how data is organised on a magnetic disk and a magnetic tape.

(f) Differentiate between Ink Line printers and Jet printers.

(g) What are pointing devices? List and describe two pointing devices


Related Discussions:- Describe the difference between cache and virtual memory

Hardware interrupts - computer architecture, Hardware interrupts: Har...

Hardware interrupts: Hardware interrupts -from I/O devices, processor, memory Software interrupts-produced by a program. Direct Memory Access (DMA)  Interrupt or Poll

Give explanation of user datagram protocol, Explain UDP (User Datagram Prot...

Explain UDP (User Datagram Protocol). UDP utilizes a connectionless communication paradigm. It is an application of using UDP doesn't require preestablishing a connection befor

Define electronic data interchange, Electronic Data Interchange (EDI ) is u...

Electronic Data Interchange (EDI ) is used by companies for transactions that happen on regular basis to a pre-determined format. It is one of the electronic commerce technologies.

Assembly 8086 program that computes the minimum and maximum, Write a progra...

Write a program that computes the minimum and maximum of elements in an array in Assembly 8086.

Reprographic methods for information distribution, Reprographic Methods ...

Reprographic Methods i) Thermography ii) Dyeline jii) Microfiche iv) Fax In this unit you have learnt that: Used for Methods of reprography are used for the

How are devices represented in unix, How are devices represented in UNIX? ...

How are devices represented in UNIX? All devices are shown by files called special files that are located in /dev directory. Therefore, device files and other files are named a

Classification according to part of instruction and data, Classification ac...

Classification according to part of instruction and data: According to the parts of instruction and data, following parts are identified under this classification: Scal

Describe the interpretation features of vba, VBA is licensed to Microsoft a...

VBA is licensed to Microsoft and this compatible with and only Microsoft products. Code written is compiled by an intermediate language known as P-code and this is stored in hostin

What is a spanning tree, What is a spanning Tree? A spanning tree is a ...

What is a spanning Tree? A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd