Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Features of read-only memory?
ROMs are memories on which it's not possible to write data when they are on-line to computer. They can only be read. This is reason why it is known as read-only memory (ROM). Because ROM chips are non-volatile, data stored inside a ROM aren't lost when power supply is switched off unlike case of a volatile RAM chip. ROMs are also called as permanent stores.
ROMs can be used for storing system programs, micro-programs and subroutines. ROMs are non-volatile in nature and require not be loaded in a secondary storage device. ROMs are fabricated in large numbers in a manner where there is no room for even a single error. However this is an inflexible process and needs mass production. So a new kind of ROM known as PROM was designed that is also non-volatile and can be written only once and therefore name Programmable ROM (PROM). Supplier or customer can perform writing process in PROM electrically. Special equipment is required to perform this writing operation. Thus PROMs are more flexible and convenient than ROMs.
ROMs / PROMs can be written just once but in both cases whatever is written once can't be changed. However what about a case where you read mostly but write just very few times? This led to concepts of read mostly memories and the best illustration of these are EPROMs (Erasable PROMs) and EEPROMs (Electrically Erasable PROMs).
Home Banking: E-commerce is used in Home Banking as single call or single click. Online banking (Internet banking) is a term used for performing transactions, payments etc. ove
User Compatibility & Appropriateness of Inputs and Outputs User compatibility - this is the degree to which the machine works towards task completion in way that suits the u
RISC-Means Reduced Instruction Set Computer. A RISC system has decreased number of instructions and more significantly it is load store architecture were pipelining can be executed
Explain Circular Dependencies. Circular Dependencies: To know the problem of circular dependencies consider a file server which uses a timeserver to acquire the current
Explain CONGESTION. CONGESTION: This is uneconomic to provide sufficient equipment to carry entire traffic that could possibly be given to a telecommunication system. Inside
What are the phases of swapping a page from the memory? Page stealer searches the page eligible for swapping and places the page number in the list of pages to be swapped. K
Pass I of the assembler must also generate the intermediate code for the processed statements. Justify your answer. Criteria for selection of a suitable intermediate code form
c-program for the minimum total number of shelves
There should be 1 server thread and N client threads, where N is supplied by the user as a command line argument. The server opens a file called "all_requests.dat", the file has
Role of Internet, Intranet and extranet in e-business The following information activities are carried out in many business: 1. Selling of raw materials 2. Advertising o
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd