Describe the difference between cache and virtual memory, Computer Engineering

Assignment Help:

Question 1:

(a) What do you meant by an expert system?

(b) Describe benefits of the EDI.

(c) Describe what you understand by:
(i) File Infectors
(ii) Boot Sector Viruses
(iii) Macro Viruses

(d) Mention steps in reducing infection risks for your PC.

(e) Mention two problems spam create for a computer user.

(f) Show the different phases of the Information System Life Cycle.

Question 2:

(a) Differentiate between system software and application software.

(b) List types of RAM

(c) List types of ROM

(d) Describe the difference between Cache Memory and Virtual Memory.

(e) Describe how data is organised on a magnetic disk and a magnetic tape.

(f) Differentiate between Ink Line printers and Jet printers.

(g) What are pointing devices? List and describe two pointing devices


Related Discussions:- Describe the difference between cache and virtual memory

Function makestk-predicate function emptystk, 1. Create the following ADTs....

1. Create the following ADTs. (a) Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk: i. makestk returns a new stack

draw the precedence diagram , The desired daily output for an assembly ...

The desired daily output for an assembly line is 360 units. This assembly line will operate 450 minutes per day. The following table have information on this product's task times a

Weight training calculations - artificial intelligence, Weight Training Cal...

Weight Training Calculations -Artificial intelligence: Because we have more weights in our network than in perceptrons, first we have to introduce the notation: wij to denote t

Which 802 standard provides for a collision free protocol, Which 802 standa...

Which 802 standard provides for a collision free protocol? 802.5 standard gives for a collision free protocol.

Multiple layers of intranet security, Multiple Layers of Intranet Security ...

Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their

How to use activex control in .net, How to use ActiveX Control in .Net ? ...

How to use ActiveX Control in .Net ? ActiveX control is a special type of COM component that handles a User Interface. Using ActiveX Control in your .Net Project is even simple

Workflow automation in e-business environment, How do you achieve workflow ...

How do you achieve workflow automation in e-business environment?   In order to run easily, organizations often standardize processes across the organization and encourage user

Processing elements (pes) -array processing, Processing elements (PEs)  : E...

Processing elements (PEs)  : Every processing element consists of ALU, local memory and its registers  for storage of distributed data. This PEs has been interconnected via an inte

What is a turing machine, What is a Turing Machine?  Turing machine is...

What is a Turing Machine?  Turing machine is a simple mathematical model of a computer. TM has unlimited an unrestricted memory and is a much more accurate model of a general

Which method uses the greatest number of layers in OSI model, Which method ...

Which method uses the greatest number of layers in the OSI model? Gateway utilizes the greatest number of layers into the OSI model.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd