Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Answer all the problems:

i) What is a light pen?

ii) What are the main limitations of primary storage of computer system?

iii) What do you understand by interrupt?

iv) Differentiate between compiler and interpreter?

Qustion2) Convert from one number system to another.

(i) (5766)8 = ?10           

(ii) 21AF16 = ?10

(iii) 110110.10102 = ?10       

(iv) 325456 = ?4

problem 3) describe RISC in detail? Describe the characteristics of RISC.

problem 4) Describe the OSI model with functionality of each layer.

problem 5) Answer all the problems:

i) What are the basic uses of computer?

ii) Distinguish between pointing stick and graphic tablet?

iii) What is multiprogramming?

iv) What is the difference between software & hardware?

v) What do you understand by real time operating system?

problem 6) Convert the following number system.

(i) (101011110101)8 - ?16   

(ii) (1AE)16 – (?)10

(iii) (95.27)10 – (?)      

problem 7) Describe the difference type of operating system.

problem 8) prepare the brief note on:

(i) Types of software

(ii) I / O interfacing technique.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94352

Have any Question? 


Related Questions in Computer Engineering

Write a program that checks the spelling of all words in a

Write a program that checks the spelling of all words in a file. It should read each word of a file and check whether it is contained in a word list. A word list is available on most UNIX systems in the file /usr/dict/wo ...

1 using rfc 1939 assume a pop3 client is in the

1. Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from the server. 2. Us ...

A robot must find the shortest path between a starting

A robot must find the shortest path between a starting point. s. and a goal location. g. in the two-dimensional space populated by polygonal obstacles shown here. Assume the robot is of infinitesimal size. The path can b ...

In the chapter we defined and implemented the student file

In the chapter, we defined and implemented the Student File Reader ADT for extracting student records from an external source. We can define and use a similar ADT for output. (a) Design a Student File Writer ADT that can ...

Repeat problem p4-3 for the differential manchester

Repeat Problem P4-3 for the differential Manchester scheme. Prob. 4.3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the graphs, g ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

1 again based on 1 above is it possible to continue

1. Again based on 1 above, is it possible to continue operating a sensor network with a selected number of sensors taken out? Is it possible to identify those nodes? 2. Devise ways (some cryptographic) of securing wirele ...

The little languages presented in section 29323 have

The little languages presented in Section 29.3.2.3 have ambiguous semantics. For example, in the location language, does "not host1 or host2" mean "not at host1 and not at host2" or "not at host1, or at host2"? a. Rewrit ...

1 using the cidr notation show the link local address in

1. Using the CIDR notation, show the link local address in which the node identifier is 0::123/48. 2. Using the CIDR notation, show the site local address in which the node identifier is 0::123/48. 3. An IPv6 packet cons ...

1 which cache design is better for each of these benchmarks

1. Which cache design is better for each of these benchmarks? Use data to support your conclusion. 2. Shared cache latency increases with the CMP size. Choose the best design if the shared cache latency doubles. Off -chi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen