Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Memory and Memory unit?
Input devices can fetch instructions or data only sequentially though a program may or may not be executed sequentially because looping, jump, decision-making instructions are frequently encountered in programming. As well more than one data element may be needed at a time. Hence a temporary storage area is required in a computer to store temporarily the instructions as well as the data. This element is termed as memory.
Memory unit stores all information in a group of memory cells like a group of 8 binary digits (which is a byte) or 16 bits or 32 bits and so on. These groups of memory cells or bits are known as memory locations. Every memory location has a unique address and can be addressed individually. Contents of desired memory locations are supplied to CPU by referring to address of memory location. Amount of information which can be held in main memory is termed as memory capacity. Capacity of main memory is measured in Mega Bytes (MB) or Giga Bytes (GB). One-kilo byte denotes 210 bytes that are 1024 bytes (or just about 1000 bytes). A Mega byte denotes 220 bytes that is near about a little over one million bytes and a giga byte is 230 bytes.
a) Input names of students from the user, terminated by "ZZZ", 0, 0, 0 and create a data file grades with records of the following form: Student (string), test1 (integer), test2 (i
A very useful application of assembly is to generate delay loops. These loops are used for waiting for some time before execution of subsequent instruction. However how to find
Depth-first search is different from Breadth-first search in the following ways: A depth search traversal method goes to the deepest level of the tree first and then works up w
Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private
Describe the necessary conditions for Deadlock. Required conditions for deadlock 1. Mutual exclusion 2. Hold and wait 3. No preemption 4. Circular wait Mutual e
Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example: The nature of the software vuln
what do you mean by inter leasing.how it is display the frame having 525 scan lines
What interprets can a browser contain besides HTML and HTTP? Besides an HTTP client and an HTML interpreter, a browser can have elements whihc enable the browser to perform any
Describe the term- Macros A macro is a key or name which signifies a series of commands or key strokes. Many applications allow single nominated key or single word on a keyboar
Consider a collection class that is similar to the ArrayList class, except that elements are sorted in a certain order. We will call this class SortedArrayList. This c
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd