Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) PCI stands for:

A. Peripheral Computer Interconnect
B. Peripheral Component Interconnect
C. Peripheral Component Interchange
D. Peripheral Computer Interchange

problem 2) Two bytes contain

A. 8 bits
B. 6 bits
C. 16 bits
D. 2 bits

problem 3) (1024)3 bytes represent:

A. 1 MB
B. 1 GB
C. 1 KB
D. 1 TB

problem 4) Which one of the following is not standard text code system:

A. BCD
B. EBCDIC
C. ASCII
D. Unimode

problem 5) Octal notation is base:

A. 8
B. 16
C. 2
D. 10

problem 6) One method to speed up the computer system is to increase:

A. The ROM capacity
B. The RAM capacity
C. The Hard Disk capacity
D. None of the above

problem 7) SDRAM stands for:

A. Static Dynamic RAM
B. Synchronising Dynamic RAM
C. Synchronous Dynamic RAM
D. Stagnant Dynamic RAM

problem 8) Which of the following ROM technologies can be erased using voltage higher than standard operating voltage:

A. PROM
B. EPROM
C. EEPROM
D. VPROM

problem 9) ____ refers to reading writing of data in any order:

A. Sequential Access
B. Random Access
C. Parallel Access
D. Virtual Access

problem 10) Data is organized and stored in concentric circular tracks on a:

A. Magnetic Disk
B. Optical Disk
C. Magnetic Tape
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96056

Have any Question? 


Related Questions in Computer Engineering

1 a cache designer wants to increase the size of a 4 kib

1. A cache designer wants to increase the size of a 4 KiB virtually indexed, physically tagged cache. Given the page size shown above, is it possible to make a 16 KiB direct-mapped cache, assuming 2 words per block? How ...

Tracy swallow has a bright idea for avoiding the need to

Tracy Swallow has a bright idea for avoiding the need to store passwords securely. She suggests transforming the user's name with a key-driven cryptographic transformation using a systemwide "password key" and giving the ...

1 implement a new version of the map adt from section 32 to

1. Implement a new version of the Map ADT from Section 3.2 to use a sorted list and the binary search algorithm. 2. The implementation of the Sparse Matrix ADT from Chapter 4 can be improved by storing the MatrixElement ...

Suppose that deborah peter and kathy are the only members

Suppose that Deborah, Peter, and Kathy are the only members of the group proj and that Deborah, Peter, and Elizabeth are the only members of the group exeter. Show how Peter can restrict access to the file design to hims ...

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

1 in the nrl classification scheme for the genesis axis how

1. In the NRL classification scheme for the "genesis" axis, how might one determine whether a vulnerability is "malicious" or "nonmalicious"? 2. In the NRL classification scheme for the "genesis" axis, can the classes "T ...

Database design consider the following supply chain

Database design . Consider the following Supply Chain information system description. The system should support a collaborative supply chain composed of suppliers, manufacturers, shippers, and end customers. Items of dif ...

Taskin this assessment you are required to -- select a

Task In this assessment you are required to - - Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportiv ...

1 discuss four access methods giving the weaknesses of

1. Discuss four access methods, giving the weaknesses of each. 2. Discuss the many ways in which access can be abused. 3. Is it possible to implement full distributed authorization? What will be involved? 4. Web authoriz ...

Below is a single node of an idef0 diagram decompose node

Below is a single node of an IDEF0 diagram. Decompose node A33 into three functions of Calculate Sales Tax, and Calculate Shipping, and Calculate Order Total. Make sure the ICOM objects remain consistent in the decomposi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro