Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Memory and Memory unit?
Input devices can fetch instructions or data only sequentially though a program may or may not be executed sequentially because looping, jump, decision-making instructions are frequently encountered in programming. As well more than one data element may be needed at a time. Hence a temporary storage area is required in a computer to store temporarily the instructions as well as the data. This element is termed as memory.
Memory unit stores all information in a group of memory cells like a group of 8 binary digits (which is a byte) or 16 bits or 32 bits and so on. These groups of memory cells or bits are known as memory locations. Every memory location has a unique address and can be addressed individually. Contents of desired memory locations are supplied to CPU by referring to address of memory location. Amount of information which can be held in main memory is termed as memory capacity. Capacity of main memory is measured in Mega Bytes (MB) or Giga Bytes (GB). One-kilo byte denotes 210 bytes that are 1024 bytes (or just about 1000 bytes). A Mega byte denotes 220 bytes that is near about a little over one million bytes and a giga byte is 230 bytes.
How can we set the table spaces and extent sizes? You can state the extent sizes and the table space (physical storage area in the database) in which a transparent table is to
Describe queue? Ans: It is a type of data structure in which the data are stored in and retrieved on a First in first out (FIFO) basis. It grows in the direction of increasin
how ant solve TSP
Describe about the Layered computer design Introduction Layered computer design focuses on computer design. It uses top-down, layered approach to design and also to improve
As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.
Knowledge Representation: To recap, we now have some characterizations of "AI", that when an "AI" problem arises, you will be able to put all into context exactly, find the co
Explain CGI standard. The CGI Standard: Technology utilized for building dynamic web documents is termed as Common Gateway Interface (CGI). The CGI standard gives how a serv
Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single
Load testing is to test that if the application works well with the loads that result from large number of concurrent users, transactions and to verify whether it can handle peak u
Q. Illustrate Characteristic tables of flip-flops? Excitation Tables Characteristic tables of flip-flops present the subsequent state when inputs and present state are kno
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd