Disadvantages of vector graphics and raster graphics

Assignment Help Computer Engineering
Reference no: EM131724713

1. Explain the basic principles, advantages, and disadvantages of vector graphics and raster graphics.

2. What character string does the following binary ASCII code represent?

1010100 1101000 1101001 1110011 0100000 1110111 1100001 1110011 0100000 1000101 1000001 1010011 1011001 0100001

3. What are the criteria that define a von Neumann architecture?

4. Reduced instruction set computers provide a large number of general-purpose registers and very few memory access instructions. Most instructions use registers instead of memory. What are the advantages of such an architecture?

5. Compare and contrast the differences in Scalar, Super Scalar, and Pipelining.

6. Look up Moore's Law on the Internet. What does it predict the processor speed to be in two years? Has it accurately predicted the processor speeds in the past?

7. A photographic image requires three bytes per pixel to produce 16 million shades of color. How large a video memory is required to store a 640 x 480 image during display? A 1024 x 768 image? A 1280 x 1024 image?

8. Think about the usefulness of open systems architecture in computer design. What would happen if there were only proprietary architectures? How would this affect a) hardware cost, b) getting upgrades, c) servicing, and d) utility software?

9. Multiple choice:
(Please select the correct answer).

9.1 The types of operations computers can perform can be best stated:

a) extremely complex operations repetitively
b) simple calculations, sorting, comparisons and simple decisions repetitively
c) complex calculations, sorting, comparisons, simple decisions repetitively
d) addition, subtraction, multiplication, division and comparisons
e) recursive, simple arithmetic and logic operations

9.2. The ____________ component controls the arithmetic and Boolean logical calculations.
a) CPU
b) ALU
c) CU
d) RAM
e) BIOS

9.3. What operation is NOT supported by most registers?

a) data movement between registers and memory
b) data from another register can be added to or subtracted from the value previously stored
c) shifting and rotations
d) data validation
e) data in a register can be tested for zero; positive or too large to fit

9.4. The first step in every instruction is...

a) increment the program counter
b) transfer the address into the Memory Data Register
c) transfer the value into the Memory Data Register
d) decode the instruction
e) transfer the address of the instruction to the Memory Address Register

9.5 Data and programs in secondary storage must be....

a) larger than primary memory
b) brought into cache memory
c) accessed directly by the CPU
d) copied to primary memory for CPU access
e) controlled by the CPU

10. True/False Please answer True (T) or False (F)).

10.1. Lossless data compression algorithms operate on the assumption that the user can accept a certain amount of data degradation as a tradeoff for the savings of a critical resource such as storage requirements.

10.2. As we add additional CPUs to a computer, processing performance increases in a linear fashion.

10.3. Memory always loses its value when power is turned off.

10.4. The number of available memory locations is determined by the size of the MAR.

10.5. When a system has multiple levels of cache memory, L2 always has more memory than L1.

Reference no: EM131724713

Questions Cloud

Program for a large software development company : describing an effective counterespionage program for a large software development company
What are the forces that are for-against the policy : Determine a clinical, formal diagnosis for this character using the criteria of the DSM-5
Prepare a schedule of expected collections for january : Paddu's purchases are 3S% cash and 6S% on account. Prepare a schedule of expected collections for January, February, and March
Explain what are economic strengths of your chosen community : Explain what are the economic strengths of your chosen community? What are the most useful strategic approaches to use in economic development?
Disadvantages of vector graphics and raster graphics : Explain the basic principles, advantages, and disadvantages of vector graphics and raster graphics.
Computation of complex numerical problems : Compute the DFS coefficients of the following periodic sequences using the DFS definition and then verify your answers using MATLAB.
Diagnostic and statistical manual of mental disorders : How may have the inputs from the section Other Conditions That May Be a Focus of Clinical Attention influenced all of your decisions?
Analyze goals functions of your current employers hrm : Analyze the goals and primary functions of your current or former employer's human resource department. Formulate the conversation you would have with employee.
What is the velocity of the truck immediately : The velocity of the car right after the collision is 17.1 m/s to the east. What is the velocity of the truck immediately after the collision?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd