What is the approximate limit of ram

Assignment Help Basic Computer Science
Reference no: EM13774222

1. Gabe and Ashley are discussing access time. Gabe says access time is the time it takes to write to or read from a memory location. Ashley says access time is the delay from the time the memory chip is given an address to the time when the data is available at the data lines. Who is correct?

A. Only Ashley

B. Neither

C. Both

D. Only Gabe

2. _______ cache memory is designed inside the CPU.

A. Racing

B. RAM

C. L2.

D. L1

3. How is the SIMM an improvement on the SIPPs and DIPs that preceded it?

A. SIMMs are larger and thus hold more memory.

B. The SIMM allows you to remove and upgrade a bank (module) of memory.

C. The SIMM is soldered to the system board.

D. Every SIMM houses a row of pins on each side.

4. 0100111, 10101010, and 111000110 are what type of numbers?

A. Binary

B. Ternary

C. Clock

D. Processor

5. Which of the following modules requires the most voltage to run?

A. DDR1

B. DDR

C. DDR3

D. DDR2

6. Access time for memory modules is measured in what unit of time?

A. Nanoseconds

B. Femtoseconds

C. Attoseconds

D. Milliseconds

7. Two technicians are discussing PROM. Technician A says that PROM chips are expensive and formatted with a device called a memorizer. Technician B says that PROM memory addresses are not arranged in rows and columns. Which technician is correct?

A. Only Technician A

B. Both

C. Only Technician B

D. Neither

8. Which of the following analogies best describes the relationship between RAM and its ability to store data?

A. Bucket with a hole in it

B. Open telephone line

C. Large bank vault with a complex combination

D. Black box with an input and output

9. If buying memory for a notebook computer, what type of module should you most likely purchase?

A. RIMM

B. SIMM

C. DIMM

D. SO-DIMM

10. If you're required to install memory in pairs for the system to work, what type of memory module are you most likely using?

A. SIPP

B. DIPP

C. DIMM

D. SIMM

11. A chip that allows the BIOS to be upgraded without removing it from the motherboard is a/an

A. ROM.

B. SDRAM.

C. EEPROM.

D. CMOS.

12. The cache uses a/an _______ method to anticipate what the CPU will need next.

A. best-guess

B. random

C. worst-case

D. algorithmic

13. What is the advantage of paging?

A. It increases speed by accessing memory in chunks.

B. Paging is assigning memory addresses and is done every time the system is booted.

C. Each page of a document is stored in one file table.

D. It allows faster mapping during the boot process.

14. How does memory cache speed up computer processing?

A. Cache memory doesn't need to be refreshed, so access time is faster.

B. Cache memory does auto-defragmenting, so access time is faster.

C. Cache memory refreshes instantly, so access time is faster.

D. Cache memory uses more buffer space, so access time is faster.

15. Cache memory uses which of the following?

A. ROM

B. SRAM

C. DRAM

D. EDO

16. Two technicians are discussing the interface between system memory and the motherboard. Technician A says data errors caused by speed mismatches are handled by making the memory run a parity check for every bit accessed. Technician B says those speed mismatch errors are avoided by building time delays into the motherboard to allow the system to catch up to the memory. Which technician is correct?

A. Neither

B. Both

C. Only Technician A

D. Only Technician B

17. Your computer at work is running a 32-bit version of Windows XP. What is the approximate limit of RAM your machine can effectively use?

A. 4 GB

B. 8 GB

C. 2 GB

D. 1 GB

18. What is a clock rate?

A. Maximum transfer rate to L2 cache

B. Oscillator on the board usually measured in MHz

C. Cursor flashing speed

D. The speed at which a hard disk spins

End of exam

19. If you need to erase the data on a specialized memory chip, and it requires ultraviolet light to do so, what type of chip should be used?

A. PROM

B. EEPROM

C. EPROM

D. ROM

20. The system board receives important information from DIMMs regarding the RAM configuration during

A. pipelining.

B. serial presence detect (SPD).

C. error checking and correcting (ECC).

D. parity.

Reference no: EM13774222

Questions Cloud

Heart and peripheral vascular system : A description of how to inspect the upper and lower extremities for skin turgor, color, temperature, and capillary refill.
How can you say celine dion''s music is not great : How can you say Celine Dion's music is not great? She has sold over 20 million albums. When using the BEAM style of evaluation, which of the following is UNLIKELY to occur?
Explain following business structure- sole proprietorship : Explain the following business structures: sole proprietorship, partnership, LLC, and a corporation. In your analysis address the following for each business structure: Steps to form and Personal liability for owners
Explain how the energy requirements change : Describe the process that ice on Mount Everest goes through when being heated from 10 degrees Fahrenheit to 305 degrees Kelvin.
What is the approximate limit of ram : Your computer at work is running a 32-bit version of Windows XP. What is the approximate limit of RAM your machine can effectively use?
What is the mass in grams : What is the mass in grams of 3.5 mol of the element gold - Gram/Mole Conversions: How many moles of magnesium, Mg, are there in 4.75 grams of magnesium?
Correlate effective education with juvenile crime : Correlate effective education with juvenile crime. An in-depth submission free of spelling and grammar errors
Health, safety and nutrition interrelated issues : How can young children be made aware of the issues that contribute to his or her well-being?
Determine the category of computer crimes : Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computing days take for fine to reach d dollars

In the recent court case, a judge cited the city for contempt and ordered fine of $2 for first day. Each subsequent day, till the city followed judge's order, fine was squared.

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Variety of web-based applications of google account

Google presents a variety of web-based applications/products through accessing Google account from any computer with internet connection.

  Explain how entities are transformed into tables

5.1-Explain how entities are transformed into tables?

  Give a cfg which represents the language

Give a CFG which represents the language {a^i b^j c^k / i!=j or j!=k }

  Write a program to fetch the state and marital status

Write a program to fetch the state and marital status of five users? If user is from CA, NV, AR, V count them towards the western region

  Define using biometrics to identity a terrorist in a crowd

What is the difference between using biometrics to ensure that only certain employees enter a bank vault and using biometrics to identity a terrorist in a crowd. Which application is more reliable and why. Assume that we're using facial recognitio..

  Multimedia application between two multimedia applications

If your running memory intensive multimedia application on the computer which has 128 MB RAM installed and computer is momentarily stopping when you switch between two multimedia applications.

  Keeping track of calculations manually

Explain the benefits of using Excel as opposed to keeping track of calculations manually

  Byte-stuff the subsequent frame payload

Byte-stuff the subsequent frame payload in which E is the escape byte, F is the flag byte, and D is a data byte other than an escape of a flag character.

  Find the standard sop

Find the standard SOP (sum of product) and POS (product of sum) expression of the subsequent Boolean function. F(A,B,C,D) = A(B' + CD') + A'BC'

  Determine characters in the encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd