Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Classification of Computers

DIGITAL, ANALOG AND HYBRID

Computers are of three basic types – Digital, Analog, and Hybrid. Current use of the word “computer” almost always refers to the electronic digital computer which uses solid-state electronic circuits.

  1. Analog: This type of computer can process continuously varying quantities rather than on-off or incrementally stepped quantities, which are the inputs for the digital computer. The moving pointer type automobile speedometer is an example of a simple mechanical analog computer. Its input is the continuously variable rotational speed of the drive shaft and its output is the pointer movement across the dial which indicates the speed of the vehicle.
  2. Digital: A digital computer uses the properties of electronic circuits which represent exactly two states – “on” or “off”. All digital computers use a combinatorial sequence of binary digits ‘0’ and ‘1’ to represent independent pieces of information. Digital computers are commonly used in business commercial applications.
  3. Hybrid: An effort to combine the best features of Analog and Digital computer resulted in the design of Hybrid computers. This “dual purpose” system combines the measuring capabilities of the analog computer and the logical and control capabilities of the digital computers. Flight simulator is an example of Hybrid computer.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9507660

Have any Question?


Related Questions in Computer Engineering

Systems and networksconsider sending a large file from a

(Systems and Networks) Consider sending a large file from a host to another host using a reliable connection such as TCP. Suppose the reliable connection uses additive-increase, multiplicative-decrease (AIMD) without slo ...

Script kiddies amp code monkeysthese two terms can be

Script Kiddies & Code Monkeys These two terms can be interpreted as derogatory, but they also appear as standard jargon in the workplace. What is a script kiddie? What is a code monkey? What are the differences? Does it ...

Can someone help me identify how intrustion detection

Can someone help me identify how Intrustion detection system and intrusion prevent system can help protect confidentiality, integrity and availability.

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

Question suppose you are the co-author of an academic paper

Question : Suppose you are the co-author of an academic paper that is being prepared for publication. The original research idea is yours, but you let your co-authors handle the data collection and actual writing of the ...

Question summarize the human-computer interface hci of

Question : Summarize the human-computer interface (HCI) of Microsoft Word 2013 and Visio 2013. Explain the importance of HCI and usability of the software. Be sure to note any commonalities between the applications and n ...

A companys balance sheet often reflects its business model

A company's balance sheet often reflects its business model and a horizontal or vertical analysis can help you identify one model from another. Using information from the text, compare horizontal and vertical analysis an ...

In relation to internet connectivity both you and the

In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security. What network device or devices can be used to address the concern about security?

Why hasnt health care in australia been entirely privatised

Why hasn't health care in Australia been entirely privatised, according to Boxall and Gillespie? Should health care (in Australia) be wholly privatised? Do you think it will be in the future?

What are the best practices to follow for microsoft windows

What are the best practices to follow for Microsoft Windows network security. Which two would you start with and why?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As