Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Tailor made software:

A. can be purchased off the shelf and used
B. is developed for specific use in organizations
C. is commercially available
D. All of the above

problem 2) A supercomputer is most appropriate for:

A. Typing documents
B. Playing video games
C. Mobility
D. solving complex scientific calculations

problem 3) The Central Processing Unit is also called as the _____:

A. Transistor
B. Port
C. Processor
D. System Bus

problem 4) Which of the following is component of the CPU:

A. RAM
B. Central Unit
C. Arithmetic and Logistic Unit
D. None of the above

problem 5) ____ are storage areas located within the CPU and offer the advantage of speed:

A. Registers
B. Random Access Memory
C. Hard Disk
D. Special Memory

problem 6) Which of the memories hold program and instructions, recorded at the factory, for booting the computer:

A. Random Access Memory
B. Read Only Memory
C. Cache Memory
D. Register

problem 7) The combination of I-Time and E-Time is known as:

A. Life Cycle
B. Program Cycle
C. Processing Cycle
D. None of the above

problem 8) During E-Time, the ALU:

A. Executes the instruction
B. Decode the instruction
C. Evaluates the instruction
D. Fetches the instruction

problem 9) All chips and other electronic components on the motherboard are interconnected via set of wires strips called as:

A. Cable
B. Bus
C. Network
D. None of the above

problem 10) The number of bits that can be carried out at one time is called the _____:

A. Bus Capacity
B. Bus Size
C. Bus Width
D. Bus Power

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96053

Have any Question? 


Related Questions in Computer Engineering

1 what is the most common form of violation of intellectual

1. What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it? 2. What are the various types of force majeure? Which type might be of greatest ...

Create a view integration to represent the combination

Create a View Integration to represent the combination between the conversion process with the acquisition payment, human resource and revenue process based on the REA patterns described on the textbook and slides for ea ...

We normally think of the one-dimensional well as being

We normally think of the one-dimensional well as being horizontal. Suppose it is vertical; then the potential energy of the particle depends on x because of the presence of the gravitational field. Calculate the first-or ...

Modify your implementation of the big integer adt from the

Modify your implementation of the Big Integer ADT from the previous question by adding the assignment combo operators that can be performed on the self and rhsInt big integers. Allow for any of the following operations t ...

1 consider the statement an individual threat agent like a

1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card n ...

1 in http draw a figure to show the application of cookies

1. In HTTP, draw a figure to show the application of cookies in a scenario in which the server allows only the registered customer to access the server. 2. In HTTP, draw a figure to show the application of cookies in a w ...

1 the binary search tree operations can also be implemented

1. The binary search tree operations can also be implemented iteratively. Design and implement an iterative solution for each operation: (a) search (b) find minimum (c) insert (d) delete 2. Design and implement the funct ...

1 how would you fi x the false sharing issue that can

1. How would you fi x the false sharing issue that can occur? 2. Consider the following portions of two different programs running at the same time on four processors in a symmetric multicore processor (SMP). Assume that ...

Random location of sparks after the third extension in the

Random location of sparks After the third extension in the Fire model, sparks are generated deterministically in the same place every time. This does not seem realistic, since real sparks probably jump to random nearby l ...

1 what is an internet what is the internet2 why are

1. What is an internet? What is the Internet? 2. Why are protocols needed? 3. In a LAN with a link-layer switch (Figure 1.8b), Host 1 wants to send a message to Host 3. Since communication is through the link-layer switc ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen