Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)a) What is data processing? Distinguish between data and information. Which one is more useful? Justify.

b) Convert:

i) (4052)16= ( ? )10
ii) (11011)2= ( ? )10.

c) What are five basic operations of computer system?

problem2)a) Distinguish between the characteristics of primary and secondary storage of computers.

b) Simplify following Boolean Function to minimum number of literals.

i) x‾y‾z+x‾y.z+xy‾

c) describe the role of components of CPU.

problem 2)a) List out the major steps involved in the execution of instruction.

b) Define Terms : Multitasking, multiprocessing and multiprogramming with exs.

c) What role do I/O devices play list ex I/O devices.

problem 3)a) List out the main uses of magnetic tape.

b) describe in brief printing mechanism of laser printer.

c) Define Terms nibble, byte, word, bit.

problem 4)a) Describe the importance of system software for a computers.

b) What is Software Engineering? What are major phases?

c) What do you understand by language of computer? What is compiler? What is its importance?

problem 5)a) What are desirable characteristics of good programming language?

b) What do you understand by machine language and assembly language? What is higher level language?

c) Distinguish

i) Compiler and Interpreter.

ii) Macro and function.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95646

Have any Question? 

Related Questions in Computer Engineering

After being fired an employee becomes disgruntled the

After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for t ...

In the fourth lab we investigate smtp protocol in action we

In the fourth lab, we investigate SMTP protocol in action. We send an e-mail and, using Wireshark, we investigate the contents and the format of the SMTP packet exchanged between the client and the server. We check that ...

Using a graphics program design several security awareness

Using a graphics program, design several security awareness posters on the following themes: updating antivirus signatures, protecting sensitive information, watching out for e-mail viruses, prohibiting the personal use ...

1 the as number in an organization is 24101 find the range

1. The AS number in an organization is 24101. Find the range of multicast addresses that the organization can use in the GLOP block. 2. A multicast address for a group is What is its 48-bit Ethernet address ...

Assignment - function1 write the following functions

Assignment - Function 1. Write the following function's prototype: function name return type input data type cubic double Two input of double values delete_blanks none none random integer none 2. Write a function prime t ...

In practice the short exponents e 3 17 and 216 1 are

In practice the short exponents e = 3, 17 and 216 +1 are widely used. 1. Why can't we use these three short exponents as values for the exponent d in applications where we want to accelerate decryption? 2. Suggest a mini ...

In a commentary piece on the rising cost of health

In a commentary piece on the rising cost of health insurance ("Healthy, Wealthy, and Wise," Wall Street Journal, May 4, 2004, A20), economists John Cogan, Glenn Hubbard, and Daniel Kessler state, "Each percentage-point r ...

Discuss how collision and broadcast domains are related but

Discuss how collision and broadcast domains are related, but different. You should compare and contrast the two domains.

1 why are vulnerabilities difficult to predict2 discuss the

1. Why are vulnerabilities difficult to predict? 2. Discuss the sources of system vulnerabilities. 3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those ...

1 what is the standard for encryption currently recommended

1. What is the standard for encryption currently recommended by NIST? 2. What is the most popular symmetric encryption system used over the Web? The most popular asymmetric system? Hybrid system?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro