Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1:

a) Differentiate clearly between the given forms of memory:

• RAM
• ROM
• PROM
• EPROM
• Cache

b) Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

c) Describe the concept of virtual memory and how it works.

problem 2:

a) describe the new storage systems that have appeared since diskettes and hard drives. Describe why there has been this need for rapid enhancements and the opportunities they provide.

b) A computer system might be describeed as MULTI-MEDIA. Describe what this means and list the hardware components likely to be found in such a system, both inside and outside the main case.

problem 3:

a) Printers used with personal computers have various characteristics from those normally found in large-scale systems. Distinguish between the two types.

b) Choose a printer appropriate for printing the master copy of an examination paper. Describe why it is appropriate and describe the mechanics of its operation.

c) Choose a different type of printer {from that in (b)} appropriate for printing utility bills sent out to over a million consumers. Describe why it is appropriate and also how this printer works.

problem 4:

a) Describe what is meant by the data structure LINKED LIST.

b) Describe how a linked list can be implemented in memory using a 2-dimensional array. [4]

c) A 2-dimensional array called N already contains student ID numbers in linked-list format so that they are in ascending order. Suppose that the list is not empty. Two variables contain necessary information.

DATUM holds the row number of the lowest number.
LAST holds the row number of the last physical entry in the table that is, row (LAST+1) will contain no data.

i) Draw up an algorithm (flowchart or pseudo-code) to display an ascending list of student IDs.
ii) Draw up an algorithm (flowchart or pseudo-code) to input a new ID and add it logically to the linked list.

problem 5: For each of the given input devices, illustrate:

• What the user needs to do before data capture
• Any limitations imposed on the data
• How the hardware itself reads the data

a) Barcode reader (borrowing and returning books in a library).
b) Magnetic stripe reader (ATM cards).
c) Optical mark recognition reader (for marking exam papers).
d) Touch screen (providing tourist information).

problem 6: Below are four illustrations of assembly-language code.

a) LDA ORDER LOAD the contents of memory address labeled ORDER.
b) SUB DISC SUBTRACT contents of memory address DISC from the number in the accumulator.
c) BNZ LOOP1 Check accumulator. If the content is non-zero, branch to label LOOP1 the next instruction.
d) BRN LOOP2 Branch to label LOOP2 unconditionally.

For each of the above, describe IN DETAIL the series of events which takes place throughout a SINGLE fetch-execute cycle. In each case and at each phase describe how the registers CIR, MAR, MDR/MBR, PC(SCR) and ACCUMULATOR change.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M94720

Have any Question? 


Related Questions in Computer Network & Security

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Windows server deployment proposaleach student will create

Windows Server Deployment Proposal Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Assignment1many more square-wave digital encoding schemes

Assignment 1. Many more square-wave digital encoding schemes exist than NRZ-L, NRZI, Manchester, differential Manchester, and bipolar-AMI. List three other encoding techniques and show an example of how each encodes. 2. ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen