Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) PCI stands for:

A. Peripheral Computer Interconnect
B. Peripheral Component Interconnect
C. Peripheral Component Interchange
D. Peripheral Computer Interchange

problem 2) Two bytes contain

A. 8 bits
B. 6 bits
C. 16 bits
D. 2 bits

problem 3) (1024)3 bytes represent:

A. 1 MB
B. 1 GB
C. 1 KB
D. 1 TB

problem 4) Which one of the following is not standard text code system:

A. BCD
B. EBCDIC
C. ASCII
D. Unimode

problem 5) Octal notation is base:

A. 8
B. 16
C. 2
D. 10

problem 6) One method to speed up the computer system is to increase:

A. The ROM capacity
B. The RAM capacity
C. The Hard Disk capacity
D. None of the above

problem 7) SDRAM stands for:

A. Static Dynamic RAM
B. Synchronising Dynamic RAM
C. Synchronous Dynamic RAM
D. Stagnant Dynamic RAM

problem 8) Which of the following ROM technologies can be erased using voltage higher than standard operating voltage:

A. PROM
B. EPROM
C. EEPROM
D. VPROM

problem 9) ____ refers to reading writing of data in any order:

A. Sequential Access
B. Random Access
C. Parallel Access
D. Virtual Access

problem 10) Data is organized and stored in concentric circular tracks on a:

A. Magnetic Disk
B. Optical Disk
C. Magnetic Tape
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96056

Have any Question? 


Related Questions in Computer Engineering

Give reasons why root should not be able to change the

Give reasons why root should not be able to change the audit UID on a UNIX system, and give reasons why it should. Which reasons sound more persuasive to you?

1 what is radius what advantage does it have over tacacs2

1. What is RADIUS? What advantage does it have over TACACS? 2. What is a content filter? Where is it placed in the network to gain the best result for the organization? 3. What is a VPN? Why is it becoming more widely us ...

Background informationfor this assignment you need to write

Background information For this assignment you need to write a console application in the Java programming language which implements a simulation for a movie borrowing and return system for the video store MovieMaster. T ...

Virtualisation is becoming increasingly important as

Virtualisation is becoming increasingly important as organisations are analysing ever larger amounts of data, and more employees wish to access their work files through cloud storage. Research virtualisation architecture ...

1 what is a performance baseline2 what is the difference

1. What is a performance baseline? 2. What is the difference between vulnerability assessment and penetration testing? 3. What are the objectives of the external monitoring domain of the maintenance model?

1 discuss the future of wireless lans2 what is a wireless

1. Discuss the future of wireless LANs. 2. What is a wireless WAN? What kind of technology can be used in it? Is this the wave of the future? 3. With the future in mind, compare and contrast ATMs and ISDN technologies.

1 list and discuss three characteristics an application

1. List and discuss three characteristics an application must have in order to be considered suited for the cloud. 2. What is MapReduce? Describe the structure and working of MapReduce. 3. What is Hadoop? Describe the th ...

1 assume a data structure is made of an integer of value

1. Assume a data structure is made of an INTEGER of value (131) and another structure made of an IPAddress of value (24.70.6.14) and an OCTETSTRING ("UDP"). Using BER, encode the data structure. 2. Given the code 0204000 ...

Sources must be cited in apa format your response should be

Sources must be cited in APA format. Your response should be four (4) double-spaced pages; refer to the "Assignment Format" page located on the Course Home page for specific format requirements. Part A: 1. Using your own ...

1 what is a discontiguous subnet why do some enterprise

1. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don't classful routing protocols support discontiguous subnets? 2. Discuss the configuration of IP addresses. When manual ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen