Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
(a) How does a data cache take advantage of spatial locality? Give an suitable example.
(b) What are the basic differences between a write-allocate and no-write-allocate policy in a cache?
(c) With the help of a fully labeled diagram, distinguish between direct and related mapping in cache memory?
(d) One example of a semiconductor memory is the DRAM
(i) Describe why a 16 Mbit DRAM chip is better being organised as compared a (2048 x 2048) x 4-bit array instead of 1M of 16 bit words.
(ii) Show a typical block diagram of the array, showing the row and column buffer blocks, refresh circuitry amongst others.
(iii) Approximately how many transistors and capacitors are required to construct a 4 MB DRAM?
(e) Describe two reasons why SRAM could be better than DRAM.
(f) Briefly explain how a multiple platter hard disk works.
Q. What is Compact Disk Recordable? To accommodate applications in which just one or a small number of copies of a set data is required write-once read-many CD called as CD Rec
Internal Structure of Agents: We have looked at agents in terms of their external influences and behaviors: they put in from the surroundings and perform rational actions to a
Explain the System Design of Object oriented modelling System Design : At this stage, the whole system model is designed. This is the phase where the complete system is divi
Q. Timing in MPI program? MPI_Wtime ( ) returns lapsed wall clock time in seconds because some random point in past. Elapsed time for program section is given by difference bet
What are the gates required to build a half adder ? Ans. The gates needed to build a half adder are EX-OR gate and AND gate as shown below the logic diagram of half adder:
Q. What do you mean by shopping bots? ANSWER: A shopping bot or buyer agent is an intelligent agent on a Web site that assists you, the customer, search the products and servic
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
What does a lock object involve? The tables. The lock argument.
Single Instruction and Single Data stream (SISD) In this organisation, sequential implementation of instructions is executed by one CPU having a single processing element (PE
An assembler is? Ans. An assembler is Machine dependant.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd