Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Memory and Memory unit?
Input devices can fetch instructions or data only sequentially though a program may or may not be executed sequentially because looping, jump, decision-making instructions are frequently encountered in programming. As well more than one data element may be needed at a time. Hence a temporary storage area is required in a computer to store temporarily the instructions as well as the data. This element is termed as memory.
Memory unit stores all information in a group of memory cells like a group of 8 binary digits (which is a byte) or 16 bits or 32 bits and so on. These groups of memory cells or bits are known as memory locations. Every memory location has a unique address and can be addressed individually. Contents of desired memory locations are supplied to CPU by referring to address of memory location. Amount of information which can be held in main memory is termed as memory capacity. Capacity of main memory is measured in Mega Bytes (MB) or Giga Bytes (GB). One-kilo byte denotes 210 bytes that are 1024 bytes (or just about 1000 bytes). A Mega byte denotes 220 bytes that is near about a little over one million bytes and a giga byte is 230 bytes.
When an input signal A=11001 is applied to a NOT gate serially, its output signal is ? Ans. First input applied will be LSB 00110, as A=11001 is serially applied to a NOT gate
What is trivial file transfer protocol? Explain briefly? Trivial File Transfer Protocol (i.e. TFTP) is helpful for bootstrapping a hardware device which does not have a disk on
Design a 8 to 1 multiplexer by using the fourvariable function given by F(A, B, C, D) = ∑ m(0,1,3,4,8,9,15). Ans. Design of 8 to 1 Multiplexer: It is a four-variable function a
How cloud can be used in Event Schedules and Management with an example. Web-based calendars can be used to post dates and schedules for specific public events, such as school
Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering - Packets (small chunks of data) are examined against a s
Which is the best programming language to learn?
What is macro-expansion? Macro calls lead to macro expansion. Throughout macro expansion, the macro call statement is replaced through a sequence of assembly statements.
We download data which arrives to me in a column. I need to use it in a complex sheet that requires data in a row. How can we convert the column data into row data? Ans) H
A* Search - artificial intelligence: A* search in the combines is the best parts of uniform cost search, namely the fact that it's optimal and complete, and the other best par
Q. Sorting Circuit along with Odd-Even Merging Circuit? The merge sort algorithm needs two circuits which imply that one circuit for merging and another circuit for sorting the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd