Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Tailor made software:

A. can be purchased off the shelf and used
B. is developed for specific use in organizations
C. is commercially available
D. All of the above

problem 2) A supercomputer is most appropriate for:

A. Typing documents
B. Playing video games
C. Mobility
D. solving complex scientific calculations

problem 3) The Central Processing Unit is also called as the _____:

A. Transistor
B. Port
C. Processor
D. System Bus

problem 4) Which of the following is component of the CPU:

A. RAM
B. Central Unit
C. Arithmetic and Logistic Unit
D. None of the above

problem 5) ____ are storage areas located within the CPU and offer the advantage of speed:

A. Registers
B. Random Access Memory
C. Hard Disk
D. Special Memory

problem 6) Which of the memories hold program and instructions, recorded at the factory, for booting the computer:

A. Random Access Memory
B. Read Only Memory
C. Cache Memory
D. Register

problem 7) The combination of I-Time and E-Time is known as:

A. Life Cycle
B. Program Cycle
C. Processing Cycle
D. None of the above

problem 8) During E-Time, the ALU:

A. Executes the instruction
B. Decode the instruction
C. Evaluates the instruction
D. Fetches the instruction

problem 9) All chips and other electronic components on the motherboard are interconnected via set of wires strips called as:

A. Cable
B. Bus
C. Network
D. None of the above

problem 10) The number of bits that can be carried out at one time is called the _____:

A. Bus Capacity
B. Bus Size
C. Bus Width
D. Bus Power

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96053

Have any Question? 


Related Questions in Computer Engineering

Given that all ascii codes are less than 128 design an

Given that all ascii codes are less than 128, design an algorithm that reads a given set of data and decides whether or not it may contain decimal data.

We now consider the relation between passwords and key size

We now consider the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password. 1. Assume a password consisting of 8 letters, where each let ...

Both turtles and patches can create visual images in the

Both turtles and patches can create visual images in the NetLogo view. Create a turtle and have it draw a circle (using the PEN-DOWN command). Create the outline of a circle with patches without using a turtle pen. Write ...

1 why should salts be chosen at random2 does using

1. Why should salts be chosen at random? 2. Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not. 3. Show that a system using an EKE ...

1 write down the bit pattern in the fraction assuming a

1. Write down the bit pattern in the fraction assuming a floating point format that uses Binary Coded Decimal (base 10) numbers in the fraction instead of base 2. Assume there are 24 bits, and you do not need to normaliz ...

1 write a method in java to find the last address in the

1. Write a method in Java to find the last address in the block when one of the addresses in the block is given as a string representing a CIDR notation. 2. Write a method in Java to find the size of a block when one add ...

1 unlike pem pgp requires the user to set a flag to

1. Unlike PEM, PGP requires the user to set a flag to indicate whether the file being protected is text or binary data. Explain why such a flag is necessary. Why does PEM not require such a flag? 2. Redraw Figure 11-6 as ...

Balanced scorecard analysis and strategic

Balanced Scorecard Analysis and Strategic Plan Resources Balanced Scorecard Analysis and Strategic Plan Scoring Guide. iGuide: ePortfolio. APA Style and Format. This assignment is the culmination of your work in previous ...

1 calculate the cpi for the processor in the table using 1

1. Calculate the CPI for the processor in the table using: 1) only a first level cache, 2) a second level direct-mapped cache, and 3) a second level eight-way set associative cache. How do these numbers change if main me ...

Your final project will be to create a program for the 3pi

Your final project will be to create a program for the 3Pi to perform a number of line following tasks. You may not program the robot between tasks but are allowed to provide inputs to the robot before each task. All lin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen