Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1) Answer all the problems.

(i) prepare down difference between analog & digital computer.

(ii) What is universal serial bus?

(iii) describe switch and switch circuit.

(iv) Distinguish between LCD & CRT monitor.

(v) Differentiate cache memory & virtual memory.

problem2) Prove the following:-

(i) a + (b + b1) + b =1

(ii) (a + b. c)1  a1 (b1 + c1)  

(iii) a. (b .c) . c1 =0

problem3) What do you mean by operating system. describe 5 key function of operating system.

problem4) Briefly describe the following:-

(i) Cache memory & its type

(ii) RISC & CISC characteristics      

problem5) Answer all the problems.

(i) What do you mean by expansion card?

(ii) What is the difference between motherboard & daughterboard?

(iii) Differentiate between system software & application software.

(iv) What is real time operating system?

(v) prepare down the difference between syntax & execution error?

problem6) What is a micro processor? prepare a brief note on evolution of microprocessor in detail.

problem7) Define logic gate? Describe the circuit of each gate with truth table.

problem8) Describe 5 internal & 5 external commands in DOS.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93808

Have any Question? 


Related Questions in Computer Engineering

Rewrite exercise 1 so that it stores the words from a text

Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times they occur in the file. Exercise 1 Write a program that generates 10,000 random integers in the r ...

Questions1read inprecipitationdat using r submit your code

Questions: 1. Read inPrecipitation.dat using R. Submit your code, and a listing and an str() of the data frame you created. (Hint: you will need to handle the missing value correctly. 2. Read in Traffic.dat using R and c ...

1 what is a dmz is this really an appropriate name for the

1. What is a DMZ? Is this really an appropriate name for the technology, considering the function this type of subnet performs? 2. What are the three questions that must be addressed when selecting a firewall for a speci ...

1 using a different measurer object process a set of

1. Using a different Measurer object, process a set of Rectangle objects to find the rectangle with the largest perimeter. 2. Enhance the DataSet class so that it can either be used with a Measurer object or for processi ...

Assume we have a stream cipher whose period is quite short

Assume we have a stream cipher whose period is quite short. We happen to know that the period is 150-200 bit in length. We assume that we do not know anything else about the internals of the stream cipher. In particular, ...

1 discuss the concept of global privilege does it work well

1. Discuss the concept of global privilege. Does it work well in a distributed authorization or centralized authorization? 2. With the principle of "least privileged," is it possible to have too much authorization? What ...

Modeling food webs we mentioned how abm can be used to

Modeling food webs We mentioned how ABM can be used to describe food webs. However, these models are often written as an aggregate description. Imagine a model where instead of individual wolf and sheep there is simply a ...

Homework1 determining the format of the number to be

HOMEWORK 1) Determining the format of the number to be entered first (binary, decimal and hexadecimal) This should be done using the CheckBoxes found in the interface. - Access to the other two text boxes outside the rel ...

1 what is separation of duties how can it be used to

1. What is separation of duties? How can it be used to improve an organization's information security practices? 2. What is job rotation, and what benefits does it offer an organization?

What is incomplete implementation is it possible to deal

What is incomplete implementation? Is it possible to deal with incomplete implementation as a way of dealing with system vulnerabilities? In other words, is it possible to completely deal with incomplete implementation? ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro