Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) What is data processing? Distinguish between data and information. Which one is more useful? Justify.

b) Convert:

i) (4052)16= ( ? )10
ii) (11011)2= ( ? )10.

c) What are five basic operations of computer system?

problem2)a) Distinguish between the characteristics of primary and secondary storage of computers.

b) Simplify following Boolean Function to minimum number of literals.

i) x‾y‾z+x‾y.z+xy‾

c) describe the role of components of CPU.

problem 2)a) List out the major steps involved in the execution of instruction.

b) Define Terms : Multitasking, multiprocessing and multiprogramming with exs.

c) What role do I/O devices play list ex I/O devices.

problem 3)a) List out the main uses of magnetic tape.

b) describe in brief printing mechanism of laser printer.

c) Define Terms nibble, byte, word, bit.

problem 4)a) Describe the importance of system software for a computers.

b) What is Software Engineering? What are major phases?

c) What do you understand by language of computer? What is compiler? What is its importance?

problem 5)a) What are desirable characteristics of good programming language?

b) What do you understand by machine language and assembly language? What is higher level language?

c) Distinguish

i) Compiler and Interpreter.

ii) Macro and function.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95646

Have any Question? 


Related Questions in Computer Engineering

1 at any moment a rip message may arrive at a router that

1. At any moment, a RIP message may arrive at a router that runs RIP as the routing protocol. Does it mean that the RIP process should be running all the time? 2. Why do you think RIP uses UDP instead of TCP? 3. We say t ...

Compare and contrast the protocol field at the network

Compare and contrast the protocol field at the network layer with the port numbers at the transport layer. What is their common purpose? Why do we need two port-number fields but only one protocol field? Why is the size ...

Explain the process of developing a service bundle using

Explain the process of developing a service bundle using the Open Service Gateway Intiative component?

Assuming stall-on-branch and no delay slots what is the new

Assuming stall-on-branch and no delay slots, what is the new clock cycle time and execution time of this instruction sequence if beq address computation is moved to the MEM stage? What is the speedup from this change? As ...

Assignment computer forensic toolsyou have been recently

Assignment: Computer Forensic Tools You have been recently hired to assist with purchasing computer forensics tools and resources for a major corporation. Using the concepts that you learned in chapters nine through twel ...

Write a program that checks the spelling of all words in a

Write a program that checks the spelling of all words in a file. It should read each word of a file and check whether it is contained in a word list. A word list is available on most UNIX systems in the file /usr/dict/wo ...

1 mention the three auxiliary protocols at the network

1. Mention the three auxiliary protocols at the network layer of the TCP/IP suite that are designed to help the IPv4 protocol. 2. In an IPv4 datagram, the value of the header-length (HLEN) field is (6)16. How many bytes ...

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

Write a program that reads in the hourly wage of an

Write a program that reads in the hourly wage of an employee. Then ask how many hours the employee worked in the past week. Be sure to accept fractional hours. Compute the pay. Any overtime work (over 40 hours per week) ...

In the fifth lab we investigate the state and behavior of

In the fifth lab, we investigate the state and behavior of the POP3 protocol. We retrieve the mails stored in our mailbox at the POP3 server and observe and analyze the states of the POP3 and the type and the contents of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen