Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Answer the following-

1. Cloud Applications are run on some web application server in the internet.

2. Multithreading computer Architectures implement the CPU in such a way that more than one instruction can be performed (completed) at a time

3. In a symmetric multiprocessing system there are multiple processors that share other all other system resources (memory, disk, etc).

4. What is the value of the following signed integer 1011 1001 = -27 or -57

http://binary-system.base-conversion.ro/binary-signed-converted-to-signed-integer-in-decimal-system.php?signed_binary=10111001&signed_integer_number_base_ten=-57

5. Direct Memory Access is the most common method of transferring data directly between a peripheral and system RAM.
http://bottomupcs.sourceforge.net/csbu/x1645.htm

6. An instruction that only the operating system can execute is called a machine instruction.

7. What is the value of the following 2's complement number?

1111 1111 1111 1011 = -5 or -10

http://www.exploringbinary.com/twos-complement-converter/

8. What technique is being utilized when high performance is obtained by subdividing the clock cycle into a number of sub-intervals Pipelining technique.

9. When a computer starts up, it begins to load information from the hard disk into its read only memory?

10. Who was the scientist who conceived the concept of a stored programmed control computer? John von Neumann who introduced the von Neumann architecture

11. Express the base 10 number < 2010 > as a base 3 number = 202.
http://gwydir.demon.co.uk/jo/numbers/binary/bases.htm

12. Only seven bits are needed to encode the complete ASCII character set. What is the 8th bit used for when encoding the ASCII symbol < @ > into an 8 bit word? =2^8

13. In a monochrome bitmap how many bits are needed to stored the color of a pixel. One bit (black and white)

14. What type of compression algorithm is used when creating a JPEG image? Lossless compression algorithm or lossy

15. What is value of the 1's complement integer 1001 1001? = 0110 0110

16. There are usually four stages in an instruction cycle. Name the first stage. Fetch the instruction stage.

17. File descriptors are an index into a file-descriptor table stored by the Kernel.

18. In lossless data compression, the original amount of data is preserved

19. The elementary component of a Quantum computer is a computer memory
http://tph.tuwien.ac.at/~oemer/doc/quprog/node8.html

20. What type of data formatting is used in the image below?
Vector image formatting

21. If you have a true color display using 8 bits for the intensity of each primary color. How many colors can you create for the display? 256 colors.

22. Encode -3 ¾ as a 32 bit IEEE binary number?

1 10000000 11100000000000000000000

23. Encode the symbol for < 5 > in binary so it can be printed on the console screen? = 101

24. Convert the Octal number 238 to a HEX number (D 16)
http://www.rapidtables.com/math/number/Numeral_system.htm

25. The Inter process communication is an in-memory buffer that connects two processes together

PIPE
https://www.bottomupcs.com/file_descriptors.xhtml

Attachment:- Questions.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92020810
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Nfs allows the file system on one linux computer to be

NFS allows the file system on one Linux computer to be accessed over a network connection by another Linux system. Discuss the security vulnerabilities of NFS in networked Linux systems, and possible mitigation solutions ...

Question each student will research a paper on big data

Question: Each student will research a paper on Big Data word document 1000 to 1500 words with graphics describing the following: 1. what is Big Data? 2. Origins ? 3. Differences? 4. examples of Big data your point of vi ...

Subject digital securityprovide an fidm authentication

Subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

Ssk software has their main office in sylvania ohio and

SSK Software has their main office in Sylvania Ohio and remote locations in Chicago, Toledo, Cleveland and Cincinnati. SSK Software currently has 62 devices connected to the network in Chicago, 30 computers in Toledo, 60 ...

1 what is a domain name in the context of internet what

1. What is a domain name in the context of Internet? What is the procedure to get a domain name and link it to an Internet Protocol (IP) address? Use an example.

Recursive greatest common divisor the greatest common

(Recursive Greatest Common Divisor) The greatest common divisor of integers x and y is the largest integer that evenly divides both x and y. what is a recursive function gcd that returns the greatest common divisor of x ...

Can someone please show me how to do this step by step

Can someone please show me how to do this step by step please. I dont understand any of it 1.) Add a new virtual disk a) Edit VMware player settings to add a new virtual hard disk. b) Start or reboot the virtual machine ...

Question squareroot write a function to determine the

Question : squareroot Write a function to determine the squareroot of a number. The squareroot of a number can be approximated by repeated calculation using the formula NG = 0.5(LG + N/LG) where NG stands for the next gu ...

System analysis and design1 describe a scenario in which

System Analysis and Design: 1) Describe a scenario in which the distribution of users determine the output technology. 2) What is the difference between gradual conversion and modular conversion? 3) At University, the co ...

In powerpoint what is beneficial about the usage or video

In Powerpoint, what is beneficial about the usage or Video, Audio, Animation, and Photos with Effects during presentation and work. What are some useful tools you found that would improve performance?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As