Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate about fourth generation computers?
One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integrated on a single chip. The major impact of VLSI was that it was possible to make a complete CPU or main memory or other related devices on a single IC chip. This showed that mass production of memory, CPU can be done at a very small cost. The VLSI-based computer architecture is occasionally termed as fourth generation computers.
Fourth generation is paired with Parallel Computer Architectures too. These computers had distributed or shared memory and specialized hardware units for floating point computation. In this period compilers as well as special languages, multiprocessing operating system and tools were created for parallel processing and distributed computing. CRAY X-MP, IBM/3090 and VAX 9000were a number of the systems developed during this era.
Fifth generation computers are also available currently. These computers majorly emphasize on Massively Parallel Processing. These computers employ high-density packaging as well as optical technologies.
What is multiplicity? Multiplicity is applied to attributes for data base application. Multiplicity for an attribute specifies the number of possible value for every instantiat
Any function can be expressed in a truth table.A truth table lists all possible combinations ofinputs and gives the output produced in eachcase.Truth tables must include all combin
Name the four steps in pipelining. Fetch : Read the instruction from the memory. Decode : Decode the instruction and get the source operand. Execute : Perform the operat
Why EPROM chips are mounted in packages that have transparent window? Since the erasure needs dissipating the charges trapped in the transistors of memory cells. This can be co
As we know how packets travel from one computer to another over the Internet. However what's in-between? Actually what makes up the Internet infrastructure or backbone? Fi
Explain Anonymous FTP. Use of a login password and name helps maintain file secure from unauthorized access. Though, sometimes these authorizations can also be inconvenient.
How non- textual information is contained in a web page? Non-textual information as digitized photo and a graphics image is not inserted directly into a HTML document. In place
Deductive Inferences - Artificial intelligence: We have described how knowledge can be represented in first-order logic, and how in logic rule-based expert systems expressed ca
Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec
A random variable (X) is modelled as an exponentially distributed with mean 30 units. Simulate N = 50 samples from this distribution, and every sample must have m = 20 simulated va
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd