Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Mainframes computer?
Mainframes, capable of executing in excess of 53 MIPS, are high-performance, general- purpose computers supporting very large databases, ranging in price from one to ten million dollars. These are used by many universities, large businesses, and government agencies, and are supplied mainly by IBM. Examples include IBM 360, CDC 7600 of Control Data Corporation, and Texas Instrument Advanced Scientific Computer (TI-ASC).
What are the major functions of IO system? i. Interface to the CPU and memory by the system bus. ii. Interface to one or more IO devices by tailored data link.
Write short note on the Johnson counter. Ans: Johnson Counter: It is a synchronous counter, where all flip-flops are clocked concurrently and the clock pulses drive the
Explain the working of Dynamic RAM? A plain piece of hardware called a DRAM controller can be used to make DRAM behave more like SRAM and the job of the DRAM controller is to p
Use of instruction register and program counter: Q. What is the use of instruction register (IR) and program counter (PC)? Ans: The instruction register (IR) holds the inst
If the input to T-flipflop is 100 Hz signal, the final output of the three T-flipflops in cascade is ? Ans. The final output of the three T-flip-flops in cascade is 12
Write in brief about UNIX process structure.
The data bus is Bi-directional because the similar bus is used for transfer of data among Micro Processor and memory or input / output devices in both the direction.
What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared
How is the command Suppress-Dialog useful? Suppressing whole screens is possible using this command. This command permits us to perform screen processing "in the background".
Th e ID3 algorithm The calculation for information gain is the very difficult phase of this algorithm. ID3 performs a search whereby the search states are decision trees an
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd