What type of data formatting is used in the given image

Assignment Help Computer Engineering
Reference no: EM131266057

Answer the following-

1. Cloud Applications are run on some web application server in the internet.

2. Multithreading computer Architectures implement the CPU in such a way that more than one instruction can be performed (completed) at a time

3. In a symmetric multiprocessing system there are multiple processors that share other all other system resources (memory, disk, etc).

4. What is the value of the following signed integer 1011 1001 = -27 or -57

https://binary-system.base-conversion.ro/binary-signed-converted-to-signed-integer-in-decimal-system.php?signed_binary=10111001&signed_integer_number_base_ten=-57

5. Direct Memory Access is the most common method of transferring data directly between a peripheral and system RAM.
https://bottomupcs.sourceforge.net/csbu/x1645.htm

6. An instruction that only the operating system can execute is called a machine instruction.

7. What is the value of the following 2's complement number?

1111 1111 1111 1011 = -5 or -10

https://www.exploringbinary.com/twos-complement-converter/

8. What technique is being utilized when high performance is obtained by subdividing the clock cycle into a number of sub-intervals Pipelining technique.

9. When a computer starts up, it begins to load information from the hard disk into its read only memory?

10. Who was the scientist who conceived the concept of a stored programmed control computer? John von Neumann who introduced the von Neumann architecture

11. Express the base 10 number < 2010 > as a base 3 number = 202.
https://gwydir.demon.co.uk/jo/numbers/binary/bases.htm

12. Only seven bits are needed to encode the complete ASCII character set. What is the 8th bit used for when encoding the ASCII symbol < @ > into an 8 bit word? =2^8

13. In a monochrome bitmap how many bits are needed to stored the color of a pixel. One bit (black and white)

14. What type of compression algorithm is used when creating a JPEG image? Lossless compression algorithm or lossy

15. What is value of the 1's complement integer 1001 1001? = 0110 0110

16. There are usually four stages in an instruction cycle. Name the first stage. Fetch the instruction stage.

17. File descriptors are an index into a file-descriptor table stored by the Kernel.

18. In lossless data compression, the original amount of data is preserved

19. The elementary component of a Quantum computer is a computer memory
https://tph.tuwien.ac.at/~oemer/doc/quprog/node8.html

20. What type of data formatting is used in the image below?
Vector image formatting

21. If you have a true color display using 8 bits for the intensity of each primary color. How many colors can you create for the display? 256 colors.

22. Encode -3 ¾ as a 32 bit IEEE binary number?

1 10000000 11100000000000000000000

23. Encode the symbol for < 5 > in binary so it can be printed on the console screen? = 101

24. Convert the Octal number 238 to a HEX number (D 16)
https://www.rapidtables.com/math/number/Numeral_system.htm

25. The Inter process communication is an in-memory buffer that connects two processes together

PIPE
https://www.bottomupcs.com/file_descriptors.xhtml

Attachment:- Questions.rar

Reference no: EM131266057

Questions Cloud

Find relative permeability of the magnetic material : A ring of magnetic material has a rectangular cross-section. The inner diameter of the ring is 20 cm and the outer diameter is 25 cm, its thickness being 2 cm.
Identify factor that affect consumer buying decision : Identify and understand the individual factors that affect consumer buying decisions. - Individual factors that affect consumer buying decisions include gender; age and family life-cycle stage; and personality, self-concept, and lifestyle.
Develop a branding strategy for your product : Examine the relevant consumer behavior for your target market. Explain the main reasons why the brand name, logo, slogan, brand extension, as well as the positioning statement and marketing strategy are right for the identified target market.
Derive the condition for zero voltage regulation : Derive the condition for zero voltage regulation. Also show that the magnitude of maximum voltage regulation equals the pu value of equivalent leakage impedance.
What type of data formatting is used in the given image : What type of data formatting is used in the image below? Who was the scientist who conceived the concept of a stored programmed control computer? John von Neumann who introduced the von Neumann architecture.
Who is close to this particular retailer : What considerations might the retailer had to have considered when thinking about their location. Parking considerations? Who is close to this particular retailer? How will that affect the business? What is their trade area? Tapestry Segment (focus s..
What is beta what type of risk does it represent : What is the difference between systematic and unsystematic risk? What is beta? What type of risk does it represent? What effect will diversifying your portfolio have on your returns and risk? What is the security market line? What does it represent
How do beliefs and attitudes influence consumer behavior : How do beliefs and attitudes influence consumer behavior? How can negative attitudes toward a product be changed?
Compute the voltage at the sending-end of the feeder : A single-phase load is fed through a 66-kV feeder whose impedance is 120 + j 400 Ω and a 66/6.6 kV transformer whose equivalent impedance (referred to LV) is 0.4 + j 1.5 Ω. The load is 250 kW at 0.8 leading power factor and 6 kV.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd