Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1:

a) Differentiate clearly between the given forms of memory:

• RAM
• ROM
• PROM
• EPROM
• Cache

b) Identify the two main bus configurations normally found in a PC. Describe why one has a limiting factor that affects the overall performance of the computer.

c) Describe the concept of virtual memory and how it works.

problem 2:

a) describe the new storage systems that have appeared since diskettes and hard drives. Describe why there has been this need for rapid enhancements and the opportunities they provide.

b) A computer system might be describeed as MULTI-MEDIA. Describe what this means and list the hardware components likely to be found in such a system, both inside and outside the main case.

problem 3:

a) Printers used with personal computers have various characteristics from those normally found in large-scale systems. Distinguish between the two types.

b) Choose a printer appropriate for printing the master copy of an examination paper. Describe why it is appropriate and describe the mechanics of its operation.

c) Choose a different type of printer {from that in (b)} appropriate for printing utility bills sent out to over a million consumers. Describe why it is appropriate and also how this printer works.

problem 4:

a) Describe what is meant by the data structure LINKED LIST.

b) Describe how a linked list can be implemented in memory using a 2-dimensional array. [4]

c) A 2-dimensional array called N already contains student ID numbers in linked-list format so that they are in ascending order. Suppose that the list is not empty. Two variables contain necessary information.

DATUM holds the row number of the lowest number.
LAST holds the row number of the last physical entry in the table that is, row (LAST+1) will contain no data.

i) Draw up an algorithm (flowchart or pseudo-code) to display an ascending list of student IDs.
ii) Draw up an algorithm (flowchart or pseudo-code) to input a new ID and add it logically to the linked list.

problem 5: For each of the given input devices, illustrate:

• What the user needs to do before data capture
• Any limitations imposed on the data
• How the hardware itself reads the data

a) Barcode reader (borrowing and returning books in a library).
b) Magnetic stripe reader (ATM cards).
c) Optical mark recognition reader (for marking exam papers).
d) Touch screen (providing tourist information).

problem 6: Below are four illustrations of assembly-language code.

a) LDA ORDER LOAD the contents of memory address labeled ORDER.
b) SUB DISC SUBTRACT contents of memory address DISC from the number in the accumulator.
c) BNZ LOOP1 Check accumulator. If the content is non-zero, branch to label LOOP1 the next instruction.
d) BRN LOOP2 Branch to label LOOP2 unconditionally.

For each of the above, describe IN DETAIL the series of events which takes place throughout a SINGLE fetch-execute cycle. In each case and at each phase describe how the registers CIR, MAR, MDR/MBR, PC(SCR) and ACCUMULATOR change.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M94720

Have any Question? 


Related Questions in Computer Network & Security

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

The following ciphertext has been obtained by vigenere

The following ciphertext has been obtained by Vigenere encryption. ocwyikoooniwugpmxwktzdwgtssayjzwyemdlbnqaaavsuwdvbrflauplooubfgq hgcscmgzlatoedcsdeidpbhtmuovpiekifpimfnoamvlpqfxejsmxmpgkccaykwfz pyuavtelwhrhmwkbbvgtgu ...

Exercise sheet1 let l be a 9 bit lfsr with connection

Exercise Sheet 1. Let L be a 9 bit LFSR with connection polynomial c(x) = x 8 + x 4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystrea ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

Network troubleshooting knowledgebasecreate knowledgebase

Network Troubleshooting Knowledgebase Create knowledgebase documentation/article(s) covering the topics below. These would be documents that you could store in a department knowledgebase that would provide a quick refere ...

Network security - web security threatsassume that you are

Network Security - Web Security Threats Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your org ...

Pcap challenge 1 objectivethe objective of this lab is

PCAP Challenge 1 Objective The objective of this lab is simple (although some of the questions will prove quite challenging), all you need to do is use the pcap file provided and investigate what transpired between 2 or ...

Current security event researchselect a company that has

Current Security Event Research Select a company that has been in the news in the past two years that has had a significant security breach. Develop a 2- to 3-page paper covering the following: • Identify the event and t ...

Your report should detail the following section and points

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may requi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate