Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate about fourth generation computers?
One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integrated on a single chip. The major impact of VLSI was that it was possible to make a complete CPU or main memory or other related devices on a single IC chip. This showed that mass production of memory, CPU can be done at a very small cost. The VLSI-based computer architecture is occasionally termed as fourth generation computers.
Fourth generation is paired with Parallel Computer Architectures too. These computers had distributed or shared memory and specialized hardware units for floating point computation. In this period compilers as well as special languages, multiprocessing operating system and tools were created for parallel processing and distributed computing. CRAY X-MP, IBM/3090 and VAX 9000were a number of the systems developed during this era.
Fifth generation computers are also available currently. These computers majorly emphasize on Massively Parallel Processing. These computers employ high-density packaging as well as optical technologies.
How can a parent and child process communicate? A parent and child can communicate by any of the normal inter-process communication schemes (pipes, sockets, message queues, sha
Explain the principle of duality with examples.
How to enter from command mode to insertion mode using Vi Editor? Ans) There are various commands that put the VI editor into insert mode. The most usually used commands to get
RAW and WAW - Data hazards: RAW (read after write) - j tries to read a source before i writes it, hence j wrongly gets the old value .This is the most usual type of
How does the system handle roll areas for external program components? Transactions run in their own roll areas. Reports run in their own roll areas. Dialog modules run
Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t
Give a simple example of dynamic modelling using these notation A simple example using these notation is shown below in Figure:
With the help of R-2R binary network, explain the working of a 3-bit D/A converter and derive an expression for the output voltage. Ans: We see a 3-bit R-2R ladder D/A netwo
Various Interconnection Networks Fully connected: This is the most controlling interconnection topology.In this each node is directly linked to all other nodes. The shortcomi
Q. Illustrate LCD Technology? The technology behind LCD is known as Nematic Technology since the molecules of liquid crystals used are nematic which implies that rod-shaped. Th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd