Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)  ______________  is a system where processing should be completed within certain time constraints suitable for the system

a) Real time systems
b) Time sharing systems
c) Both (a) and (b)
d) None of the above

problem 2)  ___________  is the smallest block that could be read or written on the disk

a) Sector
b) Track
c) Disk
d) None of the above

problem 3)  ______________ is a collection of sectors all as same circumference on the single surface

a) Track
b) Sector
c) Disk
d) None of the above

problem 4) _______________________ is a time interval when the process uses Central Processing Unit only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 5) ______________ is the time interval when the process uses I/O devices only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 6) ______________ is a time interval when the process uses I/O devices only

a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

problem 7) ____________ is precise set of instructions which describes how to perform the specific tasks

a) Algorithm
b) Graph
c) Pie chart
d) None of the above

problem 8) Which of the following is the programming language:

a) MS-Word
b) C++
c) Access
d) Power point

problem 9) _____________ is a process of writing the programs is commonly known as

a) Software
b) Coding
c) Debugging
d) None of the above

problem 10) __________ is a special program which converts the programming language Instructions into the machine level instructions

a) Modem
b) Central Processing Unit
c) Compiler
d) None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94992

Have any Question? 


Related Questions in Computer Engineering

You are a forensics investigator and need to address the

You are a forensics investigator and need to address the following cases. You can find the Case Projects at the end of Chapters 3 and 4 in your textbook. Case Project 3-3: Digital Evidence Storage Formats (CLO 1) Case Pr ...

1 comment on the reasons for the rapid growth of the

1. Comment on the reasons for the rapid growth of the Android operating system. 2. Recently Apple's iOS4 encryption was hacked by a Russian; compare and discuss the weaknesses in the iOS4 disclosed by the Russian company ...

Research the internet to determine if there are any ddbmss

Research the internet to determine if there are any DDBMSs that follow all 12 rules. Explain on examples.

1 is registration required if the mobile host acts as a

1. Is registration required if the mobile host acts as a foreign agent? Explain your answer. 2. Discuss how the ICMPv4 router solicitation message can also be used for agent solicitation. Why are there no extra fields? 3 ...

A set-associative cache has a block size of four 16-bit

A set-associative cache has a block size of four 16-bit words and a set size of 2. The cache can accommodate a total of 4096 words. The main memory size that is cacheable is 64K 32 bits. Design the cache structure and sh ...

Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

We investigate the weaknesses that arise in elgamal

We investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z∗ 29 with the primitive element α = 2. His public key is ...

Assuming stall-on-branch and no delay slots what is the new

Assuming stall-on-branch and no delay slots, what is the new clock cycle time and execution time of this instruction sequence if beq address computation is moved to the MEM stage? What is the speedup from this change? As ...

Consider how enciphering of connections would affect

Consider how enciphering of connections would affect thumbprinting. a. If the connection contents were enciphered using an end-to-end encipherment protocol, would thumbprinting work? Why or why not? b. If the connection ...

1 which fields in a log entry will be accessed for the

1. Which fields in a log entry will be accessed for the given log processing function? Assuming 64-byte cache blocks and no prefetching, how many cache misses per entry does the given function incur on average? 2. How ca ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro