Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) PCI stands for:

A. Peripheral Computer Interconnect
B. Peripheral Component Interconnect
C. Peripheral Component Interchange
D. Peripheral Computer Interchange

problem 2) Two bytes contain

A. 8 bits
B. 6 bits
C. 16 bits
D. 2 bits

problem 3) (1024)3 bytes represent:

A. 1 MB
B. 1 GB
C. 1 KB
D. 1 TB

problem 4) Which one of the following is not standard text code system:

A. BCD
B. EBCDIC
C. ASCII
D. Unimode

problem 5) Octal notation is base:

A. 8
B. 16
C. 2
D. 10

problem 6) One method to speed up the computer system is to increase:

A. The ROM capacity
B. The RAM capacity
C. The Hard Disk capacity
D. None of the above

problem 7) SDRAM stands for:

A. Static Dynamic RAM
B. Synchronising Dynamic RAM
C. Synchronous Dynamic RAM
D. Stagnant Dynamic RAM

problem 8) Which of the following ROM technologies can be erased using voltage higher than standard operating voltage:

A. PROM
B. EPROM
C. EEPROM
D. VPROM

problem 9) ____ refers to reading writing of data in any order:

A. Sequential Access
B. Random Access
C. Parallel Access
D. Virtual Access

problem 10) Data is organized and stored in concentric circular tracks on a:

A. Magnetic Disk
B. Optical Disk
C. Magnetic Tape
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96056

Have any Question? 


Related Questions in Computer Engineering

1 use keplers law to check the accuracy of a given period

1. Use Kepler's law to check the accuracy of a given period and altitude for an Iridium satellite. 2. Use Kepler's law to check the accuracy of a given period and altitude for a Globalstar satellite. 3. Find the efficien ...

Identify ten validation tests and techniques used to

Identify ten validation tests and techniques used to enhance the validity of data input; be sure to give an example of each in your discussion. How are these tests handled? This assignment must be a neat, professional pr ...

Open the sandpile model from the chemistry and physics

Open the Sandpile model from the Chemistry and Physics section of the NetLogo models library. This model, originally developed by Bak, Teng, and Weisenfeld (1987), was the first model in which self-organizing criticality ...

Databases and system architecture discussionsanswer all

Databases and System Architecture Discussions Answer all discusion topics Cables • Discuss different types of cables and the advantages/disadvantages of each type: o twisted pair o coaxial cable o fiber-optic. • Which on ...

1 complete the implementation of the multiarray class by

1. Complete the implementation of the MultiArray class by implementing the helper method computeFactors(). 2. 1 In this chapter, we implemented the Set ADT using a list. Implement the Set ADT using a bag created from the ...

1 as mentioned in the link-layer fragmentation and

1. As mentioned in the "Link-Layer Fragmentation and Interleaving" section, PPP, Frame Relay, ATM, and other WAN technologies support fragmenting packets (frames) at Layer 2. As you may have learned in basic networking c ...

1 distinguish between a getrequest pdu and a setrequest

1. Distinguish between a GetRequest PDU and a SetRequest PDU. 2. In SNMP, which of the following PDUs are sent from a client SNMP to a server SNMP? a. GetRequest b. Response c. Trap

Compare and contrast intensive selective and exclusive

Compare and contrast intensive, selective, and exclusive distribution. Give an example of a product that normally would be distributed in this way for each type of market coverage?

What are some of the best practices that are used to

What are some of the best practices that are used to optimize networks and what might be some of the pitfalls that can arise from poor network documentation?

1 intrusion detection hybrids are getting better research

1. Intrusion detection hybrids are getting better. Research the products on the market and comment on them as far as their interfaces are concerned. 2. Discuss how exploits can be used to penetrate a network. Research an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen