Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) PCI stands for:

A. Peripheral Computer Interconnect
B. Peripheral Component Interconnect
C. Peripheral Component Interchange
D. Peripheral Computer Interchange

problem 2) Two bytes contain

A. 8 bits
B. 6 bits
C. 16 bits
D. 2 bits

problem 3) (1024)3 bytes represent:

A. 1 MB
B. 1 GB
C. 1 KB
D. 1 TB

problem 4) Which one of the following is not standard text code system:

A. BCD
B. EBCDIC
C. ASCII
D. Unimode

problem 5) Octal notation is base:

A. 8
B. 16
C. 2
D. 10

problem 6) One method to speed up the computer system is to increase:

A. The ROM capacity
B. The RAM capacity
C. The Hard Disk capacity
D. None of the above

problem 7) SDRAM stands for:

A. Static Dynamic RAM
B. Synchronising Dynamic RAM
C. Synchronous Dynamic RAM
D. Stagnant Dynamic RAM

problem 8) Which of the following ROM technologies can be erased using voltage higher than standard operating voltage:

A. PROM
B. EPROM
C. EEPROM
D. VPROM

problem 9) ____ refers to reading writing of data in any order:

A. Sequential Access
B. Random Access
C. Parallel Access
D. Virtual Access

problem 10) Data is organized and stored in concentric circular tracks on a:

A. Magnetic Disk
B. Optical Disk
C. Magnetic Tape
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96056

Have any Question? 


Related Questions in Computer Engineering

Abm for education and understanding abm provides us with a

ABM for education and understanding ABM provides us with a new way of understanding the world around us. ABM has many uses in research. But ABM also has great potential as a tool for education. For instance, molecules in ...

1 discuss two security mechanisms applied at the

1. Discuss two security mechanisms applied at the application layer. Are they safer than those applied at the lower network layer? Support your response. 2. Are there security mechanisms applicable at transport layer? Is ...

Implement a class icecreamcone with methods getsurfacearea

Implement a class IceCreamCone with methods getSurfaceArea() and getVolume(). In the constructor, supply the height and radius of the cone. Be careful when looking up the formula for the surface area-you should only incl ...

1 explain the benefit of autoconfiguration2 explain the

1. Explain the benefit of autoconfiguration. 2. Explain the benefit of renumbering. 3. Which field in the IPv6 packet is responsible for multiplexing and demultiplexing?

Assignment doorstep treats guithis assignment will assess

Assignment: Doorstep Treats GUI This assignment will assess the competency: 1. Explain Windows Command Line and Forms applications 2. Demonstrate Windows Form design

Different types of distributions in this model we used a

Different types of distributions In this model we used a mean and discussed how to use variance to characterize the results of multiple runs. This characterization assumes that the distribution of data can be described u ...

1 a network manager decides to replace the old router that

1. A network manager decides to replace the old router that connects the organization to the Internet with a more powerful one. What area of network management is involved here? 2. A network manager decides to replace a ...

How could an evolutionary process like ge be used to

How could an evolutionary process, like GE be used to evolve 1. Neural networks? 2. Production systems? Describe in some detail. In particular, how would the crossover operation be implemented? Comment on whether or not ...

Compute x as far as possible without a calculator where

Compute x as far as possible without a calculator. Where appropriate, make use of a smart decomposition of the exponent as shown in the example in Sect. 1.4.1: The last problem is called a discrete logarithm and points t ...

1 eve the intruder sends a syn segment to bob the server

1. Eve, the intruder, sends a SYN segment to Bob, the server, using Alice's IP address. Can Eve create a TCP connection with Bob by pretending that she is Alice? Assume that Bob uses a different ISN for each connection 2 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen