Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Microcomputers?
Microcomputers: A microcomputer's CPU is a microprocessor. They are characteristically used as single usercomputer though present day microcomputers are very powerful. They can support highly interactive environment especially like GUI (graphical user interface) like windows. These computers are famous for home and business applications. The microcomputer initiated in late 1970's. First microcomputers were built around 8-bit microprocessor chips. What do we understand by an 8-bit chip? It implies that chip can retrieve instructions/data from storage, manipulate as well as process an 8-bit data at a time or we can say that chip has a built- in 8-bit data transfer path. A development on 8-bit chip technology was seen in early 1980s when a series of 16-bit chips called 8086 and 8088 were developed by Intel Corporation every one with advancement over the other one.
8088 was an 8/16 bit chip which means that an 8-bit path is used to transfer data between chip and primary storage (external path) however processing was done within the chip employing a 16-bit path (internal path) at a time. 8086 was a 16/16-bit chip it implies that external and internal paths both were 16 bits wide. Both of these chips could support a primary memory of storage capacity of 1 MB (Mega Byte).
Identical to Intel's chip series there exist another famous chip series of Motorola. First16-bit microprocessor of this series was MC 68000. It was a 16/32-bit chip as well as could support up to 16 MB of primary storage. Advancement over 16/32 bit chips was 32/32 chips. A number of the famous 32-bit chips were Intel's 80486 and MC 68020chip.
1) Identify the software needs of each PC and whether or not anything needs to change. a. State the changes that you would make (and why) b. If no "change" needs to be made b
Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list
Discuss the life cycle of JSP. A JSP (JavaServer Pages) page services requests like a servlet. Therefore, the life cycle and many of the abilities of JSP pages (particular in t
What are the types of consumer oriented applications of E-commerce? Four types of Consumer Oriented applications within E-Commerce are as given below: 1. B2C (business-to-c
Probelm : a) What is the purpose of "Jumps" in the 8051 Microcontroller? Describe three types of "Jumps". b) What is the purpose of a "call"? c) Differentiate between ROM
General purpose register - assembly language: Basic ISA Classes: Accumulator: 1 address add Aacc ←acc + mem [A] Stack: 0 address add to s ←to s+ next G
Connectives in first-order logic sentences - Artificial intelligence We may string predicates together into a sentence in the same way by utilising connectives that we did for
Explain the working of BCD adder One of the ways of adding decimal numbers in BCD is to use a 4-bit binary adder and perform arithmetic operation one digit at a time. The low-o
What is called PCP? The phenomenon of un-decidability is not confined to problems concerning automata. An un-decidable problem concerning on simple manipulation of strings is k
What is the use of cache memory? The use of the cache memories solves the memory access problem. In certain, when a cache is included on the same chip as the processor, access
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd