Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1) Answer all the problems.

(i) prepare down difference between analog & digital computer.

(ii) What is universal serial bus?

(iii) describe switch and switch circuit.

(iv) Distinguish between LCD & CRT monitor.

(v) Differentiate cache memory & virtual memory.

problem2) Prove the following:-

(i) a + (b + b1) + b =1

(ii) (a + b. c)1  a1 (b1 + c1)  

(iii) a. (b .c) . c1 =0

problem3) What do you mean by operating system. describe 5 key function of operating system.

problem4) Briefly describe the following:-

(i) Cache memory & its type

(ii) RISC & CISC characteristics      

problem5) Answer all the problems.

(i) What do you mean by expansion card?

(ii) What is the difference between motherboard & daughterboard?

(iii) Differentiate between system software & application software.

(iv) What is real time operating system?

(v) prepare down the difference between syntax & execution error?

problem6) What is a micro processor? prepare a brief note on evolution of microprocessor in detail.

problem7) Define logic gate? Describe the circuit of each gate with truth table.

problem8) Describe 5 internal & 5 external commands in DOS.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93808

Have any Question? 


Related Questions in Computer Engineering

1 do some research regarding cloud computing does cloud

1. Do some research regarding cloud computing. Does cloud computing fit into the types of traffic flow discussed in this book (terminal/host, client/server, peer-topeer, server/server, and distributed computing) or is it ...

George mcginnis a marketer for wingate paper is jogging

George McGinnis, a marketer for Wingate Paper, is jogging with Tom Cagle. Tom is a long-time distributor for Wingate Paper and has a good relationship with the company and its owners. George asks Tom about the status of ...

1 mention the three auxiliary protocols at the network

1. Mention the three auxiliary protocols at the network layer of the TCP/IP suite that are designed to help the IPv4 protocol. 2. In an IPv4 datagram, the value of the header-length (HLEN) field is (6)16. How many bytes ...

Research paper1describe three factors that help to

Research Paper 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in th ...

Your final project will be to create a program for the 3pi

Your final project will be to create a program for the 3Pi to perform a number of line following tasks. You may not program the robot between tasks but are allowed to provide inputs to the robot before each task. All lin ...

1 what are all the possible resulting values of w x y and z

1. What are all the possible resulting values of w, x, y, and z? For each possible outcome, explain how we might arrive at those values. You will need to examine all possible inter leavings of instructions. 2. How could ...

In this problem we will examine why techniques that work

In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value by applying the fol ...

1 not all security experts agree about the value of

1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? 2. What concerns to privacy advocates have about biometrics? Do you agree or disagree with the con ...

How do you make a module in ms acessattached is a database

How do you make a module in MS Acess Attached is a database with modules that were done for me I need directions , how and why these are built .I am trying to understand VBA and programing better. Attachment:- info262_rm ...

1 given is a stream cipher which uses a single lfsr as key

1. Given is a stream cipher which uses a single LFSR as key stream generator. The LFSR has a degree of 256. 1. How many plaintext/ciphertext bit pairs are needed to launch a successful attack? 2. Describe all steps of th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro