Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1:

a) Differentiate clearly between the given forms of memory:

• RAM
• ROM
• PROM
• EPROM
• Cache

b) Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

c) Describe the concept of virtual memory and how it works.

problem 2:

a) describe the new storage systems that have appeared since diskettes and hard drives. Describe why there has been this need for rapid enhancements and the opportunities they provide.

b) A computer system might be describeed as MULTI-MEDIA. Describe what this means and list the hardware components likely to be found in such a system, both inside and outside the main case.

problem 3:

a) Printers used with personal computers have various characteristics from those normally found in large-scale systems. Distinguish between the two types.

b) Choose a printer appropriate for printing the master copy of an examination paper. Describe why it is appropriate and describe the mechanics of its operation.

c) Choose a different type of printer {from that in (b)} appropriate for printing utility bills sent out to over a million consumers. Describe why it is appropriate and also how this printer works.

problem 4:

a) Describe what is meant by the data structure LINKED LIST.

b) Describe how a linked list can be implemented in memory using a 2-dimensional array. [4]

c) A 2-dimensional array called N already contains student ID numbers in linked-list format so that they are in ascending order. Suppose that the list is not empty. Two variables contain necessary information.

DATUM holds the row number of the lowest number.
LAST holds the row number of the last physical entry in the table that is, row (LAST+1) will contain no data.

i) Draw up an algorithm (flowchart or pseudo-code) to display an ascending list of student IDs.
ii) Draw up an algorithm (flowchart or pseudo-code) to input a new ID and add it logically to the linked list.

problem 5: For each of the given input devices, illustrate:

• What the user needs to do before data capture
• Any limitations imposed on the data
• How the hardware itself reads the data

a) Barcode reader (borrowing and returning books in a library).
b) Magnetic stripe reader (ATM cards).
c) Optical mark recognition reader (for marking exam papers).
d) Touch screen (providing tourist information).

problem 6: Below are four illustrations of assembly-language code.

a) LDA ORDER LOAD the contents of memory address labeled ORDER.
b) SUB DISC SUBTRACT contents of memory address DISC from the number in the accumulator.
c) BNZ LOOP1 Check accumulator. If the content is non-zero, branch to label LOOP1 the next instruction.
d) BRN LOOP2 Branch to label LOOP2 unconditionally.

For each of the above, describe IN DETAIL the series of events which takes place throughout a SINGLE fetch-execute cycle. In each case and at each phase describe how the registers CIR, MAR, MDR/MBR, PC(SCR) and ACCUMULATOR change.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M94720

Have any Question? 


Related Questions in Computer Network & Security

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Discussiontroubleshooting please respond to the followingas

DISCUSSION Troubleshooting" Please respond to the following: ?As explained throughout the text, troubleshooting is a structured methodology that requires personal fine-tuning. With that in mind, suppose a user at your co ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Assignment1 give a generic definition of what a

Assignment 1. Give a generic definition of what a protocol is (not related to the internet). (Knowledge) 2. Using the definition you just found explain how TCP and IP fit that definition. (Evaluation) 3. What is the resp ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen