Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Memory and Memory unit?
Input devices can fetch instructions or data only sequentially though a program may or may not be executed sequentially because looping, jump, decision-making instructions are frequently encountered in programming. As well more than one data element may be needed at a time. Hence a temporary storage area is required in a computer to store temporarily the instructions as well as the data. This element is termed as memory.
Memory unit stores all information in a group of memory cells like a group of 8 binary digits (which is a byte) or 16 bits or 32 bits and so on. These groups of memory cells or bits are known as memory locations. Every memory location has a unique address and can be addressed individually. Contents of desired memory locations are supplied to CPU by referring to address of memory location. Amount of information which can be held in main memory is termed as memory capacity. Capacity of main memory is measured in Mega Bytes (MB) or Giga Bytes (GB). One-kilo byte denotes 210 bytes that are 1024 bytes (or just about 1000 bytes). A Mega byte denotes 220 bytes that is near about a little over one million bytes and a giga byte is 230 bytes.
The COSO Framework consists of six broad classes of control activities. Initial responses should identify and define one of the broad classes (Ex: segregation of duties or indepe
What are the central interfaces of the R/3 system? There are three central interfaces:- Presentation Interface. Database Interface. Operating system Interface.
What is Grade of service? Grade of service: In a loss system, the traffic carried through the network is usually lower than the actual traffic offered to the network through
Driver software is software that works as a translator among another program and some piece of hardware. In the software industry, there are commonly standard ways to do things. Th
Question: (a) Primary and secondary memory differs in their way they access data: (i) Mention the four generic access methods usually present in a computer system. (ii) E
Question 1: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software p
What is a half-adder? Explain a half-adder with the help of truth-table and logic diagram. Ans. Half Adder: It is a logic circuit for the addition of two 1-bit numbers is term
#write a program to find the area under the curve y=f(x) between x =a and x=b integrate the area between a and b by c programming
Problem (a) Distinguish between how NTFS and FAT store time. Describe your answer. (b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores
List the steps needed to perform page replacement. The steps required to perform page replacement are: 1. Find out which page is to be removed from the memory. 2. Perfor
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd