Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain the typical organization of a computer?
There are two principal components: hardware and software. The former refers to physical components such as memory unit (MU), arithmetic and logic unit (ALU), control unit (CU), input/output (I/O) devices, etc.; whereas the latter refers to the programs (collections of ordered instructions) that direct the hardware operations.
Figure illustrates the basic organization of a digital computer. TheMU stores both data and programs that are currently processed and executed. The ALU processes the data obtained from the MU and/or input devices, and puts the processed data back into the MU and/or output devices. The CU coordinates the operations of the MU, ALU, and I/O units. While retrieving instructions from programs resident in theMU, the CU decodes these instructions and directs the ALU to perform the corresponding processing; it also oversees the I/O operations. Input devices may consist of card readers, keyboards,magnetic tape readers, andA/Dconverters; output devices may consist of line printers, plotters, and D/A converters. Devices such as terminals andmagnetic disk drives have both input and output capabilities. For communicating with the external world and for storing large quantities of data, a variety of I/O devices are used.
Software may be classified as system software and user software. The former refers to the collection of programs provided by the computer system for the creation and execution of the user programs, whereas the latter refers to the programs generated by various computer users for solving their specific problems.
What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally
#question.write cycle timing diagram for maximum mode of 8086 microprocessor.
Discuss password schemes and Biometric systems for implementing client server network security. In cyberspace, buyers & sellers cannot see each other. Also in video con
Q. Describe target processor arrangements? Having seen how to describe one or more target processor arrangements we need to initiate mechanisms for distributing data arrays ove
Q. Benefits of traditional hard disks and CD-ROM? CD-ROM is suitable for distribution of large amounts of data to a large number of users. CD-ROMs are a general medium these da
The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.
Q. Example of shared programming using library routines? Think about subsequent set of statements Process A Process B :
Biological Motivation : However remember there that in discussion first lecture is about how people have answered the question like: "How are we going to get an agent to proce
Problem a) Distributed network architecture is whereby services are executed and distributed among various computers. Give two advantages and two disadvantages of the distrib
Hardware that calculates CRC (Cyclic Redundancy Check) uses: Hardware which computes CRC utilizes shift register and Xor unit.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd