Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Explain the basic principles, advantages, and disadvantages of vector graphics and raster graphics.

2. What character string does the following binary ASCII code represent?

1010100 1101000 1101001 1110011 0100000 1110111 1100001 1110011 0100000 1000101 1000001 1010011 1011001 0100001

3. What are the criteria that define a von Neumann architecture?

4. Reduced instruction set computers provide a large number of general-purpose registers and very few memory access instructions. Most instructions use registers instead of memory. What are the advantages of such an architecture?

5. Compare and contrast the differences in Scalar, Super Scalar, and Pipelining.

6. Look up Moore's Law on the Internet. What does it predict the processor speed to be in two years? Has it accurately predicted the processor speeds in the past?

7. A photographic image requires three bytes per pixel to produce 16 million shades of color. How large a video memory is required to store a 640 x 480 image during display? A 1024 x 768 image? A 1280 x 1024 image?

8. Think about the usefulness of open systems architecture in computer design. What would happen if there were only proprietary architectures? How would this affect a) hardware cost, b) getting upgrades, c) servicing, and d) utility software?

9. Multiple choice:
(Please select the correct answer).

9.1 The types of operations computers can perform can be best stated:

a) extremely complex operations repetitively
b) simple calculations, sorting, comparisons and simple decisions repetitively
c) complex calculations, sorting, comparisons, simple decisions repetitively
d) addition, subtraction, multiplication, division and comparisons
e) recursive, simple arithmetic and logic operations

9.2. The ____________ component controls the arithmetic and Boolean logical calculations.
a) CPU
b) ALU
c) CU
d) RAM
e) BIOS

9.3. What operation is NOT supported by most registers?

a) data movement between registers and memory
b) data from another register can be added to or subtracted from the value previously stored
c) shifting and rotations
d) data validation
e) data in a register can be tested for zero; positive or too large to fit

9.4. The first step in every instruction is...

a) increment the program counter
b) transfer the address into the Memory Data Register
c) transfer the value into the Memory Data Register
d) decode the instruction
e) transfer the address of the instruction to the Memory Address Register

9.5 Data and programs in secondary storage must be....

a) larger than primary memory
b) brought into cache memory
c) accessed directly by the CPU
d) copied to primary memory for CPU access
e) controlled by the CPU

10. True/False Please answer True (T) or False (F)).

10.1. Lossless data compression algorithms operate on the assumption that the user can accept a certain amount of data degradation as a tradeoff for the savings of a critical resource such as storage requirements.

10.2. As we add additional CPUs to a computer, processing performance increases in a linear fashion.

10.3. Memory always loses its value when power is turned off.

10.4. The number of available memory locations is determined by the size of the MAR.

10.5. When a system has multiple levels of cache memory, L2 always has more memory than L1.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92533401
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Let sigmaab give the transition diagram for a

Let Σ={a,b}. Give the transition diagram for a nondeterministic ?nite state machine that accepts the set of strings in {a,b}∗ that contain a substring of length four that begins and ends with the same symbol. For example ...

Why is a secure random number different than a

Why is a secure random number different than a statistically random number in security and if it weren't securely random everything that it could impact. For example, think of everywhere that we rely on them being secure ...

Question the redblue computation simulates two interactive

Question : The Red/Blue computation simulates two interactive flows: an n × n board is initialized so cells have one of three colors: red, white, and blue, where white is empty, red moves right, and blue moves down. Colo ...

Discuss how cloud computing differs from computing on

Discuss how cloud computing differs from computing on physical machines. Identify how these differences affect the methods companies use to secure their cloud environment.

Coa assignment task -q1 a the fibonacci numbers are the

COA Assignment Task - Q1. (a) The Fibonacci numbers are the numbers in the following integer sequence, called the Fibonacci sequence, and are characterised by the fact that every number after the first two is the sum of ...

Can someone explain to me how stooge works in the most

Can someone explain to me how Stooge works in the most simplified way. Because am having a hard time understanding it. There was an example on youtube that goes like this: if you are given a small array of numbers that w ...

Regards to cin what programming situations would the use of

Regards to C++ In what programming situations would the use of an array be beneficial? What situations would not warrant the use of an array? Provide an example showing why. Research the concept of C++ vectors. Describe ...

Explain a business process you are familiar with describe

Explain a business process you are familiar with. Describe how a computer-based information system is related (or used) in this business process. Explain how a computer-based information systems can improve the efficienc ...

Please respondexplain the properties and characteristics of

PLEASE RESPOND Explain the properties and characteristics of Transmission Control Protocol/Internet Protocol (TCP/IP).

A factory makes parts for laptop computers including screws

A factory makes parts for laptop computers, including screws. The screws are required to have the right length. The lengths of the screws obey a normal distribution with mean μ=4.25 millimeters and standard deviation σ=0 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As