Describe the difference between cache and virtual memory, Computer Engineering

Assignment Help:

Question 1:

(a) What do you meant by an expert system?

(b) Describe benefits of the EDI.

(c) Describe what you understand by:
(i) File Infectors
(ii) Boot Sector Viruses
(iii) Macro Viruses

(d) Mention steps in reducing infection risks for your PC.

(e) Mention two problems spam create for a computer user.

(f) Show the different phases of the Information System Life Cycle.

Question 2:

(a) Differentiate between system software and application software.

(b) List types of RAM

(c) List types of ROM

(d) Describe the difference between Cache Memory and Virtual Memory.

(e) Describe how data is organised on a magnetic disk and a magnetic tape.

(f) Differentiate between Ink Line printers and Jet printers.

(g) What are pointing devices? List and describe two pointing devices


Related Discussions:- Describe the difference between cache and virtual memory

Give explanation about the use of SSL to secure the network, Give explanati...

Give explanation about the use of SSL to secure the network. SS L stands for Secure Sockets Layer is a protocol developed through Netscape for transmitting private document

Which is most general phase structured grammar, Which is most general phase...

Which is most general phase structured grammar? Context – Sensitive is most common phase structured grammar.

Explain about mainframes computer, Q. Explain about Mainframes computer? ...

Q. Explain about Mainframes computer? Mainframes, capable of executing in excess of 53 MIPS, are high-performance, general- purpose computers supporting very large databases, r

Comparison between centralized and distributed spc, Explain the principles ...

Explain the principles of operation of centralized SPC and distributed SPC and compare their performance. All the control equipment is replaced with a single processor that mus

What is the role of certifying authority, What is the Role of Certifying Au...

What is the Role of Certifying Authority? A certificate authority is a body, that is either public or private, that seeks to fill the requirement for trusted third-party servic

Arrow keys - input commands, When the user is inputting commands into your...

When the user is inputting commands into your shell, it should identify the left, right , up and down arrow keys. To implement this, you will need to use the termios.h library to

Connection machine fortran, Q. Connection Machine FORTRAN? Connection M...

Q. Connection Machine FORTRAN? Connection Machine Fortran was a subsequent SIMD language developed by Thinking Machines Corporation. Connection Machine Fortran incorporated all

Sap security audit log, You are required to use software of your choice (sp...

You are required to use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data ( Userdata.xls ), generate appr

Essential features of an algorithm, Necessary features of an algorithm: ...

Necessary features of an algorithm: 1.Input: The algorithm should take zero or more input. 2. Output: The algorithm should generate one or more outputs.  3. Definiteness:

Calculate the propagation delay for output, Problem: (a) Consider the ...

Problem: (a) Consider the following combinational circuit: (i) Calculate the propagation delay for each output. Assume each gate has a delay of 10 ns. (ii) The abo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd