Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)  ______________  is a system where processing should be completed within certain time constraints suitable for the system

a) Real time systems
b) Time sharing systems
c) Both (a) and (b)
d) None of the above

problem 2)  ___________  is the smallest block that could be read or written on the disk

a) Sector
b) Track
c) Disk
d) None of the above

problem 3)  ______________ is a collection of sectors all as same circumference on the single surface

a) Track
b) Sector
c) Disk
d) None of the above

problem 4) _______________________ is a time interval when the process uses Central Processing Unit only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 5) ______________ is the time interval when the process uses I/O devices only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 6) ______________ is a time interval when the process uses I/O devices only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 7) ____________ is precise set of instructions which describes how to perform the specific tasks

a) Algorithm
b) Graph
c) Pie chart
d) None of the above

problem 8) Which of the following is the programming language:

a) MS-Word
b) C++
c) Access
d) Power point

problem 9) _____________ is a process of writing the programs is commonly known as

a) Software
b) Coding
c) Debugging
d) None of the above

problem 10) __________ is a special program which converts the programming language Instructions into the machine level instructions

a) Modem
b) Central Processing Unit
c) Compiler
d) None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94992

Have any Question? 


Related Questions in Computer Engineering

An isp is granted the block 161264020 the isp needs to

An ISP is granted the block 16.12.64.0/20. The ISP needs to allocate addresses for 8 organizations, each with 256 addresses. a. Find the number and range of addresses in the ISP block. b. Find the range of addresses for ...

The task this week is to complete the following 2

The task this week is to complete the following 2 structures using a linked list: Stack Queue Assume the occurrence of a linked list node is represented by the object "Node" and its "Data" and "NextRef" attributes. Part ...

What is the total delay latency for a frame of size 5

What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 10 routers each having a queuing time of 2 μs and a processing time of 1 μs. The length of the link is 2000 Km. The s ...

1 how can a security framework assist in the design and

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administr ...

1 what do you think would happen if the control connection

1. What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection? 2. In FTP, if the client needs to retrieve one file from the server site and ...

1 what is an architectural style2 what is a design pattern3

1. What is an architectural style? 2. What is a design pattern? 3. Explain the principle of separation of concerns, and the advantages it entails for software development. 4. What is the purpose of each component in a mo ...

Metrics paperresearch the following topicmetricsreview nist

Metrics Paper Research the following topic: Metrics Review NIST SP 800-55 Rev. 1, Performance Measurement Guide for Information Security. Discuss measures you would be interested in finding the results, based on your hom ...

Assume alice the client creates a tcp connection with bob

Assume Alice, the client, creates a TCP connection with Bob, the server. They exchange data and close the connection. Now Alice starts a new connection with Bob by sending a new SYN segment. The server responds with the ...

1 rewrite the console application that uses an

1. Rewrite the Console application that uses an iterator-based linked list as a Windows application. 2. According to legend, the 1st-century Jewish historian, Flavius Josephus, was captured along with a band of 40 compat ...

1 what is a hash function and what can it be used for2 why

1. What is a hash function, and what can it be used for? 2. Why is it important to exchange keys out of band in symmetric encryption? 3. What is the fundamental difference between symmetric and asymmetric encryption?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen