Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) prepare down the between RAM and ROM.

b) What are mainframe and super computers?

c) prepare down the advantages of e-mail over traditional mail?

d) What do you mean by bit and byte.

e) What are the different features of Object Oriented programming language?

f) prepare down the merits and demerits of magnetic tape.

g) What is the radix of hexadecimal and octal number system? Give suitable ex.

h) What is binary and octal number system? Give suitable ex of each.

i) What is hardware and software? Give suitable exs.

problem 2) Draw and describe the block diagram of computer system.

problem 3) Describe any two input and any two output devices.

problem 4) Describe the history of Internet. What are the different services of Internet?

problem 5) What is MS-Excel? Describe its structure. What are its different uses?

problem 6) What is meant by a language translator? Describe various types of language translators. Give merits and demerits of each.

problem 7) Convert the following:

i) (10101001)2 = (?)10

ii) (2471)10 = (?)2

iii) (ABC)16= (?)10

iv) (2471)10= (?)16

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M98292

Have any Question? 


Related Questions in Computer Engineering

1 what are the three primary aspects of information

1. What are the three primary aspects of information security risk management? Why is each important? 2. What is a management maintenance model? What does it accomplish? 3. What changes needed to be made to the model pre ...

As we have seen in this chapter public-key cryptography can

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why ...

1 discuss the differences between clouding computing and

1. Discuss the differences between clouding computing and virtualization. 2. Discuss four business applications best suited for cloud computing. 3. To determine what business applications should go on the cloud, you need ...

1 how can a security framework assist in the design and

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administr ...

An ip datagram has arrived with the following partial

An IP datagram has arrived with the following partial information in the header (in hexadecimal): 45000054 00030000 2006... a. What is the header size? b. Are there any options in the packet? c. What is the size of the d ...

In the game of life a blinker is a period 2 oscillator can

In the Game of Life, a blinker is a period 2 oscillator. Can you find another period 2 oscillator? How about a period 3 oscillator? A period 15 oscillator? Save your configurations as buttons in the Life model in the Net ...

Design and implement an algorithm that will convert a

Design and implement an algorithm that will convert a general multiway tree (each node may have more than two successors) to the corresponding ordered binary tree.

Compare and contrast intensive selective and exclusive

Compare and contrast intensive, selective, and exclusive distribution. Give an example of a product that normally would be distributed in this way for each type of market coverage?

1 why is it important for organizations to have a business

1. Why is it important for organizations to have a business continuity plan in place? 2. Why is important for organizations to have a disaster recovery plan? 3. If companies have both a BCP and a DRP in place do they nee ...

1 in your opinion is computer forensics a viable tool in

1. In your opinion, is computer forensics a viable tool in the fight against the cyber crime epidemic? 2. Discuss the difficulties faced by cyber crime investigators. 3. Differentiate between computer and network forensi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro