Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) Comment on the general structure of the IAS Computer, illustrate your answer using a diagram.
(b) (i) Define CPU time.
(a) (ii) A program runs in 10 seconds on a computer A, which has a 100 MHZ clock. A designer has to build a machine B that will run the same program in 6 seconds. The designer has determined that a substantial increase in clock rate is possible, but this will affect the rest of the CPU design, causing machine B to require 1.2 times as many clock cycles as machine A for this program. What clock rate should the designer target?
(c) Explain what is meant by a "bus". Name the two types of buses and give a brief description of both.
(d) Explain with the help of a diagram how to accommodate interrupts in an instruction cycle.
1. (e) In respect of computer disks, explain the terms: (i) Sector, (ii) Track, (iii) Cylinder.
Design a easy (text-based/ graphical) UI for your program. The user should be encouraged for parameter values for the particular protocol simulation. For example, the user sho
What are the conditions that have to be met for a condition to be an invariant of the class? Ans) ? The condition should hold at the end of each constructor. ? The conditi
Define class NP. Problems that can be solved in polynomial time by a nondeterministic TM. Contains all problems in P and some problems possibly outside P.
With relevant diagram explain the working of master-slave JK flip flop. Ans. Master-Slave J-K FLIP-FLOP: A cascade of two S-R FLIP-FLOPS is a master-slave J-K FLIP-FLOP. One
system area
Q. Explain about Interrupt Cycle? On completion of execute cycle the current instruction execution gets completed. At this point a test is made to conclude whether any enabled
Q. What are the values of x, y, and z. (1011.001101)2 = (x)10 = (y)8 = (z)16 Q. What are the various ways to represent Negative Numbers in the Computer system?
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
Error detection mechanism may include checking mechanical and data communication errors. These errors must be reported to processor. The illustrations of kind of mechanical errors
Explain two dimensional array In two dimensional arrays, array is a pointer-to-pointer-to-data type.: at the first level, it points to a block of pointers, one for each row. Th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd