Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Memory and Memory unit?
Input devices can fetch instructions or data only sequentially though a program may or may not be executed sequentially because looping, jump, decision-making instructions are frequently encountered in programming. As well more than one data element may be needed at a time. Hence a temporary storage area is required in a computer to store temporarily the instructions as well as the data. This element is termed as memory.
Memory unit stores all information in a group of memory cells like a group of 8 binary digits (which is a byte) or 16 bits or 32 bits and so on. These groups of memory cells or bits are known as memory locations. Every memory location has a unique address and can be addressed individually. Contents of desired memory locations are supplied to CPU by referring to address of memory location. Amount of information which can be held in main memory is termed as memory capacity. Capacity of main memory is measured in Mega Bytes (MB) or Giga Bytes (GB). One-kilo byte denotes 210 bytes that are 1024 bytes (or just about 1000 bytes). A Mega byte denotes 220 bytes that is near about a little over one million bytes and a giga byte is 230 bytes.
An assembly line consists of 3 fail safe sensors and one emergency shutdown switch. The line must keep moving unless any of the given conditions occur: a. When the emergency swi
Define the term- Analysis The analysis involves some or all of the following stages: Fact finding - this is usually done in four ways. Understanding the current syst
Define secondary memory. This memory holds those pages that are not present in main memory. The secondary memory is usually a high speed disk. It is known as the swap evice, an
Discuss about Constrained-Random Verification Methodology Advent of constrained-random verification gives verification engineers an effective method to achieve covera
Instruction level This is the initial level and the degree of parallelism is uppermost at this level. The fine grain size is used at statement or instruction level as only few
Design a circuit which computes the square of a number? This should not make use of any multiplier circuits. This should use Multiplexers and some other logic as: 1^2=0+1=1
What is the maximum number of fragments that can result from a single IP Datagram? Explain. To fragment a datagram for transmission across a network, a router utilizes the netw
converting 10 ASCII characters to excess three using mplab ide
Normal 0 false false false EN-US X-NONE X-NONE Figure: SIMD Organisation
in asp project is i have to crate database every time when i move my project on different server
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd