Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Tailor made software:

A. can be purchased off the shelf and used
B. is developed for specific use in organizations
C. is commercially available
D. All of the above

problem 2) A supercomputer is most appropriate for:

A. Typing documents
B. Playing video games
C. Mobility
D. solving complex scientific calculations

problem 3) The Central Processing Unit is also called as the _____:

A. Transistor
B. Port
C. Processor
D. System Bus

problem 4) Which of the following is component of the CPU:

A. RAM
B. Central Unit
C. Arithmetic and Logistic Unit
D. None of the above

problem 5) ____ are storage areas located within the CPU and offer the advantage of speed:

A. Registers
B. Random Access Memory
C. Hard Disk
D. Special Memory

problem 6) Which of the memories hold program and instructions, recorded at the factory, for booting the computer:

A. Random Access Memory
B. Read Only Memory
C. Cache Memory
D. Register

problem 7) The combination of I-Time and E-Time is known as:

A. Life Cycle
B. Program Cycle
C. Processing Cycle
D. None of the above

problem 8) During E-Time, the ALU:

A. Executes the instruction
B. Decode the instruction
C. Evaluates the instruction
D. Fetches the instruction

problem 9) All chips and other electronic components on the motherboard are interconnected via set of wires strips called as:

A. Cable
B. Bus
C. Network
D. None of the above

problem 10) The number of bits that can be carried out at one time is called the _____:

A. Bus Capacity
B. Bus Size
C. Bus Width
D. Bus Power

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96053

Have any Question? 


Related Questions in Computer Engineering

Create a model that has two buttons the first should create

Create a model that has two buttons. The first should create twenty-five turtles and scatter them around the world. The second button, when pressed, should ask each turtle that is to the left of the origin to print its W ...

Design and implement an algorithm that will convert a

Design and implement an algorithm that will convert a general multiway tree (each node may have more than two successors) to the corresponding ordered binary tree.

1 can a host have more than one multicast address explain2

1. Can a host have more than one multicast address? Explain. 2. A multicast router is connected to four networks. The interest of each network is shown below. What is the group list that should be advertised by the route ...

1 how is an incident response plan different from a

1. How is an incident response plan different from a disaster recovery plan? 2. What is risk appetite? Explain why risk appetite varies from organization to organization. 3. What is a cost benefit analysis?

1 complete the tutorials that are available in the netlogo

1. Complete the tutorials that are available in the NetLogo User Manual. 2. Look over the models in the Sample Models section of the NetLogo models library. The models are grouped by subject area. Pick out a model you fi ...

Network design proposal part cmit 265 fundamentals of

Network Design Proposal Part CMIT 265 Fundamentals of Networking In this section, address each of the following. Identify network services needed. List additional servers or network devices needed to implement the networ ...

A uniprocessor has an l1 and an l2 cache with no cache

A uniprocessor has an L1 and an L2 cache. With no cache misses, the processor achieves a CPI of 1. Suppose that in reality an L1 miss occurs every 50 cycles and that an L2 miss occurs every 500 cycles. The L1 miss penalt ...

1 what is the purpose of a graphics context2 why are

1. What is the purpose of a graphics context? 2. Why are separate viewer and component classes used for graphical programs? 3. How do you specify a text color?

The web server on the dmz web server system renames

The Web server on the DMZ Web server system renames temporary files used to record transactions. The name has the form trns followed by the integer representation of the date and time, followed by one or more digits. Why ...

1 in the nrl classification scheme for the genesis axis how

1. In the NRL classification scheme for the "genesis" axis, how might one determine whether a vulnerability is "malicious" or "nonmalicious"? 2. In the NRL classification scheme for the "genesis" axis, can the classes "T ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen