+1-415-315-9853

info@mywordsolution.com

## Computer Science

 Algorithms Design Computer Network & Security Automata & Computation Operating System Computer Architecture Information Technology Internet Programming Software Engineering Data Communication Computer Graphics Compiler Design LINUX/UNIX Data Structure WINDOWS Application Digital Circuit E-Commerce Microprocessor Artificial Intelligence Data Warehouse Cryptography

problem 1:

a) Differentiate clearly between the given forms of memory:

• RAM
• ROM
• PROM
• EPROM
• Cache

b) Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

c) Describe the concept of virtual memory and how it works.

problem 2:

a) describe the new storage systems that have appeared since diskettes and hard drives. Describe why there has been this need for rapid enhancements and the opportunities they provide.

b) A computer system might be describeed as MULTI-MEDIA. Describe what this means and list the hardware components likely to be found in such a system, both inside and outside the main case.

problem 3:

a) Printers used with personal computers have various characteristics from those normally found in large-scale systems. Distinguish between the two types.

b) Choose a printer appropriate for printing the master copy of an examination paper. Describe why it is appropriate and describe the mechanics of its operation.

c) Choose a different type of printer {from that in (b)} appropriate for printing utility bills sent out to over a million consumers. Describe why it is appropriate and also how this printer works.

problem 4:

a) Describe what is meant by the data structure LINKED LIST.

b) Describe how a linked list can be implemented in memory using a 2-dimensional array. [4]

c) A 2-dimensional array called N already contains student ID numbers in linked-list format so that they are in ascending order. Suppose that the list is not empty. Two variables contain necessary information.

DATUM holds the row number of the lowest number.
LAST holds the row number of the last physical entry in the table that is, row (LAST+1) will contain no data.

i) Draw up an algorithm (flowchart or pseudo-code) to display an ascending list of student IDs.
ii) Draw up an algorithm (flowchart or pseudo-code) to input a new ID and add it logically to the linked list.

problem 5: For each of the given input devices, illustrate:

• What the user needs to do before data capture
• Any limitations imposed on the data
• How the hardware itself reads the data

a) Barcode reader (borrowing and returning books in a library).
b) Magnetic stripe reader (ATM cards).
c) Optical mark recognition reader (for marking exam papers).
d) Touch screen (providing tourist information).

problem 6: Below are four illustrations of assembly-language code.

a) LDA ORDER LOAD the contents of memory address labeled ORDER.
b) SUB DISC SUBTRACT contents of memory address DISC from the number in the accumulator.
c) BNZ LOOP1 Check accumulator. If the content is non-zero, branch to label LOOP1 the next instruction.
d) BRN LOOP2 Branch to label LOOP2 unconditionally.

For each of the above, describe IN DETAIL the series of events which takes place throughout a SINGLE fetch-execute cycle. In each case and at each phase describe how the registers CIR, MAR, MDR/MBR, PC(SCR) and ACCUMULATOR change.

Computer Network & Security, Computer Science

• Category:- Computer Network & Security
• Reference No.:- M94720

Have any Question?

## Related Questions in Computer Network & Security

### Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

### Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

### Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

### Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

### Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

### Assignment network layerquestion 1 routing 1 use the packet

Assignment: Network Layer Question 1: Routing 1. Use the Packet Tracer software to build the above network. a. Choose the generic empty router type for your routers. b. Choose the generic empty switch type for your switc ...

### Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

### Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

### You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

### The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

• 4,153,160 Questions Asked
• 13,132 Experts
• 2,558,936 Questions Answered

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

### Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen