Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1:
(a) What do you meant by an expert system?
(b) Describe benefits of the EDI.
(c) Describe what you understand by: (i) File Infectors (ii) Boot Sector Viruses (iii) Macro Viruses
(d) Mention steps in reducing infection risks for your PC.
(e) Mention two problems spam create for a computer user.
(f) Show the different phases of the Information System Life Cycle.
Question 2:
(a) Differentiate between system software and application software.
(b) List types of RAM
(c) List types of ROM
(d) Describe the difference between Cache Memory and Virtual Memory.
(e) Describe how data is organised on a magnetic disk and a magnetic tape.
(f) Differentiate between Ink Line printers and Jet printers.
(g) What are pointing devices? List and describe two pointing devices
Give the organization of centralized store program control ( SPC). Within stored program control systems, a program or set of instructions for the computer that is stored in
Determine about the Voice Systems Speech recognizers are used in some graphics workstations as input devices to accept voice commands. The voice-system input can be used to ini
RAM: Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory. RAM- Random Access memory it is a Volatile Memory. volatil
Your shell should accept and execute the pipe "|" operator. This will look like the following: | The functionality of this operator is to execute command1 and send i
Can you give an example of what might be best suited to place in the application_Start and Session_Start subroutines? Application Start - We can place code to initialize var
What is reentrant tasks and functions Tasks and functions without optional keyword automatic are static , with all declared items being statically allocated. These items will b
State the advantages Off-the-shelf - tends to be less expensive as development costs can be spread over many users - can be more sophisticated as large sales bring in c
Q. How does computer know that overflow has happened? Illustration: Add numbers 65 and 75 in 8 bit register in signed 2's complement notation. Here expected result is
What are the two approaches used for generating the control signals in proper sequence? Hardwired control Micro programmed control
Explain about subsystem and object of object oriented modeling A subsystem is a grouping of elements of that constitutes a specification of behaviour offered by other contained
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd