Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe about Minicomputers?
Minicomputers, developed in the early 1960s, are high-performance, general-purpose multi user computers. These are also designed for real-time dedicated applications. The PDP-11 series fromDigital Equipment Corporation (DEC) have been themost prominent 16-bitminicomputers, and are now obsolete. The 32-bit minicomputers, known as superminis, were developed in the 1970s, the most prominent one being the VAX 8600 from DEC, which was capable of executing about 5 million instructions per second (MIPS). New VAX lines with larger MIPS have been developed since.
1. Figure 1 below shows the truth table for five different functions. Each truth table shows the inputs x1, x2 and the desired output d. (a) Write down which of these functions
Logic Programs: A subset of first order logic is "Logic programs". However logic program having a set of Horn clauses that are implication conjectures when there is a conjunct
Another useful feature of an experts system is its predicative modelling power. The system can act as an information processing theory or model of problem solving in th
A system utility that comes with Windows that permits the use to change a variety of dissimilar Windows and system settings.
Described auto increment mode of addressing? Ans: Effective address of the operand is the contents of a register mention in the instruction. After finishing the accessing t
a. Explain the hardware mechanism for handling multiple interrupt requests. b. What are handshaking signals? Describe the handshake control of data transfer during input and out
Which of the memories stores the most number of bits ? Ans. 5Mx8 = 5 x 220 x 8 = 40M (max).
Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer
Why can not data reader by returned from a Web Services Method? Ans) Due to, it is not serializable
Public Key Encryption A cryptographic system that uses two-keys-a public key known to everyone and a private or secret key known only to the recipient of the message. An si
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd