Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) Briefly explain how the functionality of the WWW has been enhanced, after its birth at CERN site. Use examples to illustrate your answer.
(b) Many modern computers are being sold without floppy disk drives. State two reasons why floppy disk drives are no longer considered necessary.
(c) Differentiate between sequential access and direct access when referring to a secondary storage device. Give one example of each.
(d) Briefly describe the four factors that affect the performance of a monitor.
(e) Computer security is often divided into three distinct master categories (controls): physical, technical and administrative. Explain what you understand by these different controls, giving examples to support your answer.
Q. Show the spawned program? include "pvm3.h" main() { int ptid, msgtag; char buf[100]; ptid = pvm_parent(); strcpy(buf, "hello, world from ");
What are the blocks of microprocessor based system 1. The Memory and I/O System 2. The DOS Operating System 3. The Microprocessor
Input a list of positive numbers, terminated by 0, into an array Numbers. Then display the array and the largest and smallest number in it.
What is the advantage of buffering? Is buffering always effective? Justify your answer with help of an example. I/O buffer: One type of input-output requirement arises from d
What is the difference between a subscript and an index in a table definition? Ans) A subscript is a working storage data definition item, typically a PIC (999) where a value mu
What is macro call? Explain. Macro call: While a macro name is used along with a set of actual parameters this is replaced through a code generated from its body. Such code
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a
Problem Show which of the weighted arithmetic mean, geometric mean or harmonic mean, you would use in each of the following case. Justify your answer in each case. (a)
Interrupt Signal Interconnection Network (ISIN) When a processor needs to send an interruption to another processor, then this interrupt initial goes to ISIN, through which it
Q. Program for interchanging the values of two Memory locations? Program for interchanging the values of two Memory locations ; input: Two memory variables of same size:
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd